insights-operator/gathers.json0000640000000000000000000004451015147050301015251 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/container_runtime_configs","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":53,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":65,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig","duration_in_ms":16930,"records_count":162,"errors":["function \"machine_autoscalers\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"machine_healthchecks\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"machines\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"events/openshift-machine-api.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/control-plane-machine-set-operator-686847ff5f-rvz4w.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":16918,"records_count":65,"errors":["the record with the same name \"events/openshift-machine-api.json\" was already recorded and had the fingerprint \"5b9148580183e1f666e296fb45f0a650f166263394a1e912957cacf06f0b5478\", overwriting with the record having fingerprint \"18e46bb9a9a9753d245f4e3a25bed72b8ff7ab652601f5e9eb03bf0ddf7ac255\"","the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj.json\" was already recorded and had the fingerprint \"b88c58a72d6b7c2073fd0995608816347746b9f753d3f8a20d6f6a2d3876b535\", overwriting with the record having fingerprint \"b88c58a72d6b7c2073fd0995608816347746b9f753d3f8a20d6f6a2d3876b535\"","the record with the same name \"config/pod/openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2.json\" was already recorded and had the fingerprint \"48907b7f3dbb36b3bbf9ffaf6dbd668bdf211e962c3fa1645ed697f021a92d61\", overwriting with the record having fingerprint \"48907b7f3dbb36b3bbf9ffaf6dbd668bdf211e962c3fa1645ed697f021a92d61\"","the record with the same name \"config/pod/openshift-machine-api/control-plane-machine-set-operator-686847ff5f-rvz4w.json\" was already recorded and had the fingerprint \"51fd55a17a377dba1495a53a172f0990434244c20135ccce30420d52b499adda\", overwriting with the record having fingerprint \"51fd55a17a377dba1495a53a172f0990434244c20135ccce30420d52b499adda\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j.json\" was already recorded and had the fingerprint \"fc33a18ca99b5bba763175a5f9babd4336ccfca126e7816bce5d61a42e666ba1\", overwriting with the record having fingerprint \"fc33a18ca99b5bba763175a5f9babd4336ccfca126e7816bce5d61a42e666ba1\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_previous.log\" was already recorded and had the fingerprint \"43c0b0368e56512b2dc53db3bd0b9c905cd2455a28a964d62b9a4786a2dd4c37\", overwriting with the record having fingerprint \"43c0b0368e56512b2dc53db3bd0b9c905cd2455a28a964d62b9a4786a2dd4c37\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_current.log\" was already recorded and had the fingerprint \"e56a42c4ad0838f53e073bd3d05c0045eeae9030efeb0397ee22e6d0e18526bf\", overwriting with the record having fingerprint \"e56a42c4ad0838f53e073bd3d05c0045eeae9030efeb0397ee22e6d0e18526bf\""],"warnings":["warning: the record with the same fingerprint \"b88c58a72d6b7c2073fd0995608816347746b9f753d3f8a20d6f6a2d3876b535\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj.json\"","warning: the record with the same fingerprint \"48907b7f3dbb36b3bbf9ffaf6dbd668bdf211e962c3fa1645ed697f021a92d61\" was already recorded at path \"config/pod/openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2.json\", recording another one with a different path \"config/pod/openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2.json\"","warning: the record with the same fingerprint \"51fd55a17a377dba1495a53a172f0990434244c20135ccce30420d52b499adda\" was already recorded at path \"config/pod/openshift-machine-api/control-plane-machine-set-operator-686847ff5f-rvz4w.json\", recording another one with a different path \"config/pod/openshift-machine-api/control-plane-machine-set-operator-686847ff5f-rvz4w.json\"","warning: the record with the same fingerprint \"fc33a18ca99b5bba763175a5f9babd4336ccfca126e7816bce5d61a42e666ba1\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j.json\"","warning: the record with the same fingerprint \"43c0b0368e56512b2dc53db3bd0b9c905cd2455a28a964d62b9a4786a2dd4c37\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"e56a42c4ad0838f53e073bd3d05c0045eeae9030efeb0397ee22e6d0e18526bf\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_current.log\""],"panic":null},{"name":"workloads/workload_info","duration_in_ms":4626,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":65,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":134,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":4788,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":4817,"records_count":10,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":45,"records_count":0,"errors":["machinehealthchecks.machine.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machinehealthchecks\" in API group \"machine.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":36,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":46,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":42,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":42,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":64,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":57,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":84,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":52,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":79,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10862,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":42,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":34,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":47,"records_count":0,"errors":["machines.machine.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machines\" in API group \"machine.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":65,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":43,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":3323,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":4627,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":50,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":124,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":41,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":40,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":89,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":91,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":52,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":50,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":63,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":5415,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":5995,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11604,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":40,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":85,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":4942,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":40,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":45,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":1318,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":36,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":121,"records_count":13,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":51,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":48,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":116,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":25.269,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515147050301017756 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515147050301021060 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000004505715147050300014243 0ustar0000000000000000{"pods":78,"imageCount":56,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":7,"invalidCount":6,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a1b426a276216372c7d688fe60e9eaf251efd35071f94e1bcd4337f51a90fd75","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","firstCommand":"FATPL2W-sitV","firstArg":"gcNszUTvGLqr"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":5,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]},{"restartAlways":false,"containers":[{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"gcNszUTvGLqr"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"ignoredCount":1,"shapes":[]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","firstArg":"aZFPdeh8u0QY"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","firstArg":"zO0oxtw_mcI5"}]}]}}}package-server-manager_current.log0000640000000000000000000005226415147050273037137 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-8tzms2026-02-23T13:01:53.811567872Z 2026-02-23T13:01:53Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:53.811567872Z 2026-02-23T13:01:53Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:54.006113400Z 2026-02-23T13:01:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:54.006113400Z 2026-02-23T13:01:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:54.006142351Z 2026-02-23T13:01:54Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:54.006166632Z 2026-02-23T13:01:54Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:54.032727309Z 2026-02-23T13:01:54Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:54.032727309Z 2026-02-23T13:01:54Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:54.847288681Z 2026-02-23T13:01:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:54.847324022Z 2026-02-23T13:01:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:54.847457306Z 2026-02-23T13:01:54Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:54.847542859Z 2026-02-23T13:01:54Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:54.890296612Z 2026-02-23T13:01:54Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:54.890296612Z 2026-02-23T13:01:54Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:55.484479761Z 2026-02-23T13:01:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:55.484479761Z 2026-02-23T13:01:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:55.484572424Z 2026-02-23T13:01:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:55.484601175Z 2026-02-23T13:01:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:55.528310664Z 2026-02-23T13:01:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:55.528310664Z 2026-02-23T13:01:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:57.611549752Z 2026-02-23T13:01:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:57.611549752Z 2026-02-23T13:01:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:57.611692557Z 2026-02-23T13:01:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:57.611749508Z 2026-02-23T13:01:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:57.674852537Z 2026-02-23T13:01:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:57.674852537Z 2026-02-23T13:01:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:58.271393421Z 2026-02-23T13:01:58Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:58.271504754Z 2026-02-23T13:01:58Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:58.271681779Z 2026-02-23T13:01:58Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:58.271790453Z 2026-02-23T13:01:58Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:58.343690921Z 2026-02-23T13:01:58Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:58.343690921Z 2026-02-23T13:01:58Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:58.460744059Z 2026-02-23T13:01:58Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:58.460744059Z 2026-02-23T13:01:58Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:58.460744059Z 2026-02-23T13:01:58Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:58.460744059Z 2026-02-23T13:01:58Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:58.502338014Z 2026-02-23T13:01:58Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:58.502338014Z 2026-02-23T13:01:58Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:59.664364985Z 2026-02-23T13:01:59Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:01:59.664364985Z 2026-02-23T13:01:59Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:59.664364985Z 2026-02-23T13:01:59Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:01:59.664364985Z 2026-02-23T13:01:59Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:01:59.714388999Z 2026-02-23T13:01:59Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:01:59.714388999Z 2026-02-23T13:01:59Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:00.625719136Z 2026-02-23T13:02:00Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:02:00.625719136Z 2026-02-23T13:02:00Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:00.625994774Z 2026-02-23T13:02:00Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:00.626114077Z 2026-02-23T13:02:00Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:02:00.661289253Z 2026-02-23T13:02:00Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:02:00.661289253Z 2026-02-23T13:02:00Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:01.265598306Z 2026-02-23T13:02:01Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:02:01.265598306Z 2026-02-23T13:02:01Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:01.265709529Z 2026-02-23T13:02:01Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:01.265795481Z 2026-02-23T13:02:01Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:02:01.314507136Z 2026-02-23T13:02:01Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:02:01.314507136Z 2026-02-23T13:02:01Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:02.112677129Z 2026-02-23T13:02:02Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:02:02.112677129Z 2026-02-23T13:02:02Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:02.112711210Z 2026-02-23T13:02:02Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:02.112724671Z 2026-02-23T13:02:02Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:02:02.145928999Z 2026-02-23T13:02:02Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:02:02.145928999Z 2026-02-23T13:02:02Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:03.170436010Z 2026-02-23T13:02:03Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:02:03.170436010Z 2026-02-23T13:02:03Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:03.170436010Z 2026-02-23T13:02:03Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:02:03.170436010Z 2026-02-23T13:02:03Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:02:03.201351130Z 2026-02-23T13:02:03Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:02:03.201351130Z 2026-02-23T13:02:03Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:03:27.353285892Z E0223 13:03:27.353099 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-23T13:04:27.357794477Z E0223 13:04:27.357639 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-23T13:05:54.627155359Z 2026-02-23T13:05:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:05:54.627155359Z 2026-02-23T13:05:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.632097895Z 2026-02-23T13:05:54Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.632097895Z 2026-02-23T13:05:54Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:05:54.664707532Z 2026-02-23T13:05:54Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:05:54.664707532Z 2026-02-23T13:05:54Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.669923234Z 2026-02-23T13:05:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:05:54.669923234Z 2026-02-23T13:05:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.669923234Z 2026-02-23T13:05:54Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.669923234Z 2026-02-23T13:05:54Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:05:54.691836740Z 2026-02-23T13:05:54Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:05:54.693549234Z 2026-02-23T13:05:54Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.887363081Z 2026-02-23T13:05:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:05:54.887363081Z 2026-02-23T13:05:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.887363081Z 2026-02-23T13:05:54Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:54.887363081Z 2026-02-23T13:05:54Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:05:54.906368223Z 2026-02-23T13:05:54Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:05:54.906368223Z 2026-02-23T13:05:54Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:55.158738217Z 2026-02-23T13:05:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:05:55.158738217Z 2026-02-23T13:05:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:55.158738217Z 2026-02-23T13:05:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:55.158738217Z 2026-02-23T13:05:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:05:55.173982534Z 2026-02-23T13:05:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:05:55.173982534Z 2026-02-23T13:05:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:55.279716326Z 2026-02-23T13:05:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T13:05:55.279716326Z 2026-02-23T13:05:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:55.279716326Z 2026-02-23T13:05:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T13:05:55.279716326Z 2026-02-23T13:05:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T13:05:55.294980584Z 2026-02-23T13:05:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T13:05:55.294980584Z 2026-02-23T13:05:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415147050273035632 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-8tzms2026-02-23T13:01:40.184827124Z W0223 13:01:40.184441 1 deprecated.go:66] 2026-02-23T13:01:40.184827124Z ==== Removed Flag Warning ====================== 2026-02-23T13:01:40.184827124Z 2026-02-23T13:01:40.184827124Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T13:01:40.184827124Z 2026-02-23T13:01:40.184827124Z =============================================== 2026-02-23T13:01:40.184827124Z 2026-02-23T13:01:40.185048551Z I0223 13:01:40.184966 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T13:01:40.188411782Z I0223 13:01:40.188374 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T13:01:40.189603897Z I0223 13:01:40.189341 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-23T13:01:40.190216086Z I0223 13:01:40.190187 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005604015147050273033153 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5499d7f7bb-g9x742026-02-23T13:05:54.881810560Z I0223 13:05:54.881767 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"50783dce-cd08-4bd8-b26e-4ddb96204949", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"10098", FieldPath:""}): type: 'Normal' reason: 'AllRequirementsMet' all requirements found, attempting install 2026-02-23T13:05:54.896418591Z time="2026-02-23T13:05:54Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=kGtz0 namespace=openshift-operator-lifecycle-manager phase=Pending 2026-02-23T13:05:54.896452522Z E0223 13:05:54.896438 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-02-23T13:05:55.066174378Z W0223 13:05:55.066043 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-02-23T13:05:55.137086618Z I0223 13:05:55.135236 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"50783dce-cd08-4bd8-b26e-4ddb96204949", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"10112", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-02-23T13:05:55.168199597Z time="2026-02-23T13:05:55Z" level=warning msg="reusing existing cert packageserver-service-cert" 2026-02-23T13:05:55.197993623Z W0223 13:05:55.197906 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-02-23T13:05:55.218651197Z I0223 13:05:55.218572 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"50783dce-cd08-4bd8-b26e-4ddb96204949", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"10112", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-02-23T13:05:55.225059590Z time="2026-02-23T13:05:55Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=WVyby namespace=openshift-operator-lifecycle-manager phase=InstallReady 2026-02-23T13:05:55.225059590Z E0223 13:05:55.225046 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-02-23T13:05:55.262375647Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=MqEwh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.262375647Z I0223 13:05:55.262335 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"50783dce-cd08-4bd8-b26e-4ddb96204949", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"10152", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-02-23T13:05:55.364706613Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=Cr4dm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.364877267Z I0223 13:05:55.364820 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"50783dce-cd08-4bd8-b26e-4ddb96204949", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"10152", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-02-23T13:05:55.371979538Z time="2026-02-23T13:05:55Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=GjOEg namespace=openshift-operator-lifecycle-manager phase=Installing 2026-02-23T13:05:55.372055839Z E0223 13:05:55.372024 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-02-23T13:05:55.466033954Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=V6whF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.473235137Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=/3MIX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.479541647Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=UEiKJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.486767790Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=0PIn5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.493447829Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=5WBBC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.504363587Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=XzXLo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.511264272Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=o+RwO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.517938871Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=V7HW1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.522895097Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=XZjp6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.529981096Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=2RP9Y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.536416710Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=qPsnk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.542359041Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=fREwW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.603997515Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=yrt/F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.738171619Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=/ouSP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.804297407Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=MEGRY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:55.901361168Z time="2026-02-23T13:05:55Z" level=info msg="install strategy successful" csv=packageserver id=3jACp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.003068009Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=rpvaY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.102189294Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=dqKTs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.202919200Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=RxbWg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.303568954Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=XG46D namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.406057324Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=hR4KI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.506777490Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=HU8v2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.607471845Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=EM9hM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.707812991Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=U6Xzd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.809396688Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=xqxKF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:56.907776004Z time="2026-02-23T13:05:56Z" level=info msg="install strategy successful" csv=packageserver id=Qw8Tp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.007579616Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=Ta3H8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.109159764Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=Sy36d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.211965502Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=4OEYK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.310437201Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=MicbH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.410143411Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=Z7NWh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.513035961Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=uHZN0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.609872478Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=+GtdU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.709932737Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=T3h7J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.811970126Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=dO0tE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:57.910119937Z time="2026-02-23T13:05:57Z" level=info msg="install strategy successful" csv=packageserver id=uubPl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.011135380Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=arHse namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.112661816Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=NPp42 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.211522054Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=m82gX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.301883657Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=B9E8t namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.403763982Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=64ZCr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.503315438Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=f1KWj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.602141875Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=bOjpV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.702027190Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=y0DwL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.801615957Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=qypOw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:58.903128352Z time="2026-02-23T13:05:58Z" level=info msg="install strategy successful" csv=packageserver id=hVYH7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.003730885Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=idJpB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.104364348Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=RqWYb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.205057103Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=zU7Gl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.303007979Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=x6H9I namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.403105318Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=nGieq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.503272059Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=UdLGs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.602174428Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=sTDnt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.701906529Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=qtbGN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.802307846Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=21K3E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:05:59.902561010Z time="2026-02-23T13:05:59Z" level=info msg="install strategy successful" csv=packageserver id=bc3IK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.001916861Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=FhML5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.102627486Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=kR4rG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.202678095Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=zMP7y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.305161265Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=UvTi0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.402042353Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=ASAXJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.503500308Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=0JZ8Y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.604829149Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=fmwUY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.705345809Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=b5Gx4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.810858566Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=YNbZv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:00.906850862Z time="2026-02-23T13:06:00Z" level=info msg="install strategy successful" csv=packageserver id=KxIek namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.002022277Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=yv+YP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.107142634Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=9heJ2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.206812973Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=GsT65 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.302762427Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=LLLtK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.402526589Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=eZANN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.619606017Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=1fGid namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.628039501Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=HpXCi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.703017573Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=yiS7O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.802031865Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=UNlaz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:01.901580211Z time="2026-02-23T13:06:01Z" level=info msg="install strategy successful" csv=packageserver id=oRq68 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.002290297Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=zDYIw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.101659968Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=DZND7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.202557808Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=3LqOU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.302355100Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=Im/Us namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.402852090Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=P5gDk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.502640432Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=/w1+c namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.602682660Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=R0Y2j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T13:06:02.702834611Z time="2026-02-23T13:06:02Z" level=info msg="install strategy successful" csv=packageserver id=hbB8t namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment config/pod/openshift-operator-lifecycle-manager/collect-profiles-29530860-9f5kd.json0000640000000000000000000000724615147050273026500 0ustar0000000000000000{"metadata":{"name":"collect-profiles-29530860-9f5kd","generateName":"collect-profiles-29530860-","namespace":"openshift-operator-lifecycle-manager","uid":"a82698b6-5a88-4fc7-915c-e56e32aafa81","resourceVersion":"2948","creationTimestamp":"2026-02-23T13:00:00Z","labels":{"batch.kubernetes.io/controller-uid":"a2619386-9527-4829-a133-1e4c34dbf60f","batch.kubernetes.io/job-name":"collect-profiles-29530860","controller-uid":"a2619386-9527-4829-a133-1e4c34dbf60f","job-name":"collect-profiles-29530860"},"annotations":{"openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"batch/v1","kind":"Job","name":"collect-profiles-29530860","uid":"a2619386-9527-4829-a133-1e4c34dbf60f","controller":true,"blockOwnerDeletion":true}],"finalizers":["batch.kubernetes.io/job-tracking"]},"spec":{"volumes":[{"name":"config-volume","configMap":{"name":"collect-profiles-config","defaultMode":420}},{"name":"secret-volume","secret":{"secretName":"pprof-cert","defaultMode":420}},{"name":"kube-api-access-l7gzb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"collect-profiles","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","command":["bin/collect-profiles"],"args":["-n","openshift-operator-lifecycle-manager","--config-mount-path","/etc/config","--cert-mount-path","/var/run/secrets/serving-cert","olm-operator-heap-:https://olm-operator-metrics:8443/debug/pprof/heap","catalog-operator-heap-:https://catalog-operator-metrics:8443/debug/pprof/heap"],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config-volume","mountPath":"/etc/config"},{"name":"secret-volume","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-l7gzb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"collect-profiles","serviceAccount":"collect-profiles","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"openshift-user-critical","priority":1000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:00Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}catalog-operator_current.log0000640000000000000000000020277315147050273035076 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-596f79dd6f-mjhwm2026-02-23T13:05:58.900573778Z time="2026-02-23T13:05:58Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=xKGiT 2026-02-23T13:05:58.901447460Z time="2026-02-23T13:05:58Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=certified-operators state.State=CONNECTING" 2026-02-23T13:05:58.908919269Z time="2026-02-23T13:05:58Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=certified-operators state.State=TRANSIENT_FAILURE" 2026-02-23T13:05:59.089796479Z time="2026-02-23T13:05:59Z" level=info msg="No subscriptions were found in namespace openshift-monitoring" id=549j7 namespace=openshift-monitoring 2026-02-23T13:05:59.089829780Z time="2026-02-23T13:05:59Z" level=info msg="resolving sources" id=yGeGI namespace=openshift-network-diagnostics 2026-02-23T13:05:59.089829780Z time="2026-02-23T13:05:59Z" level=info msg="checking if subscriptions need update" id=yGeGI namespace=openshift-network-diagnostics 2026-02-23T13:05:59.101887436Z time="2026-02-23T13:05:59Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.102071630Z time="2026-02-23T13:05:59Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-mldw4 current-pod.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.102083290Z time="2026-02-23T13:05:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-mldw4 current-pod.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.102105161Z time="2026-02-23T13:05:59Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=+lo8j 2026-02-23T13:05:59.102113521Z time="2026-02-23T13:05:59Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.102121521Z time="2026-02-23T13:05:59Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.288732156Z time="2026-02-23T13:05:59Z" level=info msg="No subscriptions were found in namespace openshift-multus" id=abmG3 namespace=openshift-multus 2026-02-23T13:05:59.288732156Z time="2026-02-23T13:05:59Z" level=info msg="resolving sources" id=sPLn+ namespace=openshift-network-node-identity 2026-02-23T13:05:59.288732156Z time="2026-02-23T13:05:59Z" level=info msg="checking if subscriptions need update" id=sPLn+ namespace=openshift-network-node-identity 2026-02-23T13:05:59.495910482Z time="2026-02-23T13:05:59Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:05:59.496015545Z time="2026-02-23T13:05:59Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:05:59.688903549Z time="2026-02-23T13:05:59Z" level=info msg="No subscriptions were found in namespace openshift-network-diagnostics" id=yGeGI namespace=openshift-network-diagnostics 2026-02-23T13:05:59.688903549Z time="2026-02-23T13:05:59Z" level=info msg="resolving sources" id=tBr5d namespace=openshift-network-operator 2026-02-23T13:05:59.688903549Z time="2026-02-23T13:05:59Z" level=info msg="checking if subscriptions need update" id=tBr5d namespace=openshift-network-operator 2026-02-23T13:05:59.888587095Z time="2026-02-23T13:05:59Z" level=info msg="No subscriptions were found in namespace openshift-network-node-identity" id=sPLn+ namespace=openshift-network-node-identity 2026-02-23T13:05:59.888631377Z time="2026-02-23T13:05:59Z" level=info msg="resolving sources" id=ursqX namespace=openshift-node 2026-02-23T13:05:59.888631377Z time="2026-02-23T13:05:59Z" level=info msg="checking if subscriptions need update" id=ursqX namespace=openshift-node 2026-02-23T13:05:59.900723643Z time="2026-02-23T13:05:59Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.900723643Z time="2026-02-23T13:05:59Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-mldw4 current-pod.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.900723643Z time="2026-02-23T13:05:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-mldw4 current-pod.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.900767405Z time="2026-02-23T13:05:59Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.900767405Z time="2026-02-23T13:05:59Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+lo8j 2026-02-23T13:05:59.901330199Z time="2026-02-23T13:05:59Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=community-operators state.State=CONNECTING" 2026-02-23T13:05:59.906200142Z time="2026-02-23T13:05:59Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=community-operators state.State=TRANSIENT_FAILURE" 2026-02-23T13:06:00.087529563Z time="2026-02-23T13:06:00Z" level=info msg="No subscriptions were found in namespace openshift-network-operator" id=tBr5d namespace=openshift-network-operator 2026-02-23T13:06:00.087557374Z time="2026-02-23T13:06:00Z" level=info msg="resolving sources" id=DGy8S namespace=openshift-nutanix-infra 2026-02-23T13:06:00.087557374Z time="2026-02-23T13:06:00Z" level=info msg="checking if subscriptions need update" id=DGy8S namespace=openshift-nutanix-infra 2026-02-23T13:06:00.101034366Z time="2026-02-23T13:06:00Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.101154289Z time="2026-02-23T13:06:00Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-ccxr7 current-pod.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.103636972Z time="2026-02-23T13:06:00Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"20MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"20Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-marketplace\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-marketplace\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c13,c12,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000180000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n\u00a0\u00a0\tImagePullSecrets: {{Name: \"redhat-marketplace-dockercfg-977zq\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-ccxr7 current-pod.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.103673213Z time="2026-02-23T13:06:00Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-ccxr7 current-pod.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.103673213Z time="2026-02-23T13:06:00Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=false id=s41hD 2026-02-23T13:06:00.103673213Z time="2026-02-23T13:06:00Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.287858256Z time="2026-02-23T13:06:00Z" level=info msg="No subscriptions were found in namespace openshift-node" id=ursqX namespace=openshift-node 2026-02-23T13:06:00.287886577Z time="2026-02-23T13:06:00Z" level=info msg="resolving sources" id=8MOIg namespace=openshift-oauth-apiserver 2026-02-23T13:06:00.287886577Z time="2026-02-23T13:06:00Z" level=info msg="checking if subscriptions need update" id=8MOIg namespace=openshift-oauth-apiserver 2026-02-23T13:06:00.496848469Z time="2026-02-23T13:06:00Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:00.496848469Z time="2026-02-23T13:06:00Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:00.688850131Z time="2026-02-23T13:06:00Z" level=info msg="No subscriptions were found in namespace openshift-nutanix-infra" id=DGy8S namespace=openshift-nutanix-infra 2026-02-23T13:06:00.688850131Z time="2026-02-23T13:06:00Z" level=info msg="resolving sources" id=pkfl8 namespace=openshift-openstack-infra 2026-02-23T13:06:00.688886092Z time="2026-02-23T13:06:00Z" level=info msg="checking if subscriptions need update" id=pkfl8 namespace=openshift-openstack-infra 2026-02-23T13:06:00.890722013Z time="2026-02-23T13:06:00Z" level=info msg="No subscriptions were found in namespace openshift-oauth-apiserver" id=8MOIg namespace=openshift-oauth-apiserver 2026-02-23T13:06:00.890722013Z time="2026-02-23T13:06:00Z" level=info msg="resolving sources" id=/p2tL namespace=openshift-operator-controller 2026-02-23T13:06:00.890785444Z time="2026-02-23T13:06:00Z" level=info msg="checking if subscriptions need update" id=/p2tL namespace=openshift-operator-controller 2026-02-23T13:06:00.900037109Z time="2026-02-23T13:06:00Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.900733557Z time="2026-02-23T13:06:00Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-ccxr7 current-pod.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.902910722Z time="2026-02-23T13:06:00Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"20MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"20Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-7jhh8\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-marketplace\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-marketplace\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c13,c12,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000180000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n\u00a0\u00a0\tImagePullSecrets: {{Name: \"redhat-marketplace-dockercfg-977zq\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-ccxr7 current-pod.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.902968133Z time="2026-02-23T13:06:00Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-ccxr7 current-pod.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.902968133Z time="2026-02-23T13:06:00Z" level=info msg="registry pods invalid, need to overwrite" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:00.902968133Z time="2026-02-23T13:06:00Z" level=info msg="deleting current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD pod.name=redhat-marketplace-ccxr7 pod.namespace=openshift-marketplace 2026-02-23T13:06:01.088962003Z time="2026-02-23T13:06:01Z" level=info msg="No subscriptions were found in namespace openshift-openstack-infra" id=pkfl8 namespace=openshift-openstack-infra 2026-02-23T13:06:01.089021034Z time="2026-02-23T13:06:01Z" level=info msg="resolving sources" id=Us4lb namespace=openshift-operator-lifecycle-manager 2026-02-23T13:06:01.089021034Z time="2026-02-23T13:06:01Z" level=info msg="checking if subscriptions need update" id=Us4lb namespace=openshift-operator-lifecycle-manager 2026-02-23T13:06:01.103013109Z time="2026-02-23T13:06:01Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:01.103148563Z time="2026-02-23T13:06:01Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-shjn2 current-pod.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:01.105859521Z time="2026-02-23T13:06:01Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"30MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"30Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-operators\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-operators\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c13,c12,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000180000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n\u00a0\u00a0\tImagePullSecrets: {{Name: \"redhat-operators-dockercfg-lp4jk\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-shjn2 current-pod.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:01.105883732Z time="2026-02-23T13:06:01Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-shjn2 current-pod.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:01.105883732Z time="2026-02-23T13:06:01Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=false id=bM8Cj 2026-02-23T13:06:01.105883732Z time="2026-02-23T13:06:01Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:01.289224014Z time="2026-02-23T13:06:01Z" level=info msg="No subscriptions were found in namespace openshift-operator-controller" id=/p2tL namespace=openshift-operator-controller 2026-02-23T13:06:01.289224014Z time="2026-02-23T13:06:01Z" level=info msg="resolving sources" id=yhQds namespace=openshift-operators 2026-02-23T13:06:01.289281235Z time="2026-02-23T13:06:01Z" level=info msg="checking if subscriptions need update" id=yhQds namespace=openshift-operators 2026-02-23T13:06:01.307460347Z time="2026-02-23T13:06:01Z" level=info msg="creating desired pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD pod.name= pod.namespace=openshift-marketplace 2026-02-23T13:06:01.617767720Z time="2026-02-23T13:06:01Z" level=info msg="No subscriptions were found in namespace openshift-operator-lifecycle-manager" id=Us4lb namespace=openshift-operator-lifecycle-manager 2026-02-23T13:06:01.617796571Z time="2026-02-23T13:06:01Z" level=info msg="resolving sources" id=OuYx0 namespace=openshift-ovirt-infra 2026-02-23T13:06:01.617828752Z time="2026-02-23T13:06:01Z" level=info msg="checking if subscriptions need update" id=OuYx0 namespace=openshift-ovirt-infra 2026-02-23T13:06:01.688135185Z time="2026-02-23T13:06:01Z" level=info msg="No subscriptions were found in namespace openshift-operators" id=yhQds namespace=openshift-operators 2026-02-23T13:06:01.688135185Z time="2026-02-23T13:06:01Z" level=info msg="resolving sources" id=DqrFg namespace=openshift-ovn-kubernetes 2026-02-23T13:06:01.688135185Z time="2026-02-23T13:06:01Z" level=info msg="checking if subscriptions need update" id=DqrFg namespace=openshift-ovn-kubernetes 2026-02-23T13:06:01.711972540Z W0223 13:06:01.711895 1 warnings.go:70] spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-02-23T13:06:01.712641547Z time="2026-02-23T13:06:01Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:01.712641547Z time="2026-02-23T13:06:01Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=s41hD 2026-02-23T13:06:01.888705194Z time="2026-02-23T13:06:01Z" level=info msg="No subscriptions were found in namespace openshift-ovirt-infra" id=OuYx0 namespace=openshift-ovirt-infra 2026-02-23T13:06:01.888705194Z time="2026-02-23T13:06:01Z" level=info msg="resolving sources" id=SF8bq namespace=openshift-route-controller-manager 2026-02-23T13:06:01.888705194Z time="2026-02-23T13:06:01Z" level=info msg="checking if subscriptions need update" id=SF8bq namespace=openshift-route-controller-manager 2026-02-23T13:06:02.088567896Z time="2026-02-23T13:06:02Z" level=info msg="No subscriptions were found in namespace openshift-ovn-kubernetes" id=DqrFg namespace=openshift-ovn-kubernetes 2026-02-23T13:06:02.088592196Z time="2026-02-23T13:06:02Z" level=info msg="resolving sources" id=UyYxw namespace=openshift-service-ca 2026-02-23T13:06:02.088592196Z time="2026-02-23T13:06:02Z" level=info msg="checking if subscriptions need update" id=UyYxw namespace=openshift-service-ca 2026-02-23T13:06:02.100764945Z time="2026-02-23T13:06:02Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:02.100786086Z time="2026-02-23T13:06:02Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-shjn2 current-pod.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:02.106058329Z time="2026-02-23T13:06:02Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"30MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"30Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8c7fg\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000180000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-operators\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-operators\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c13,c12,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000180000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n\u00a0\u00a0\tImagePullSecrets: {{Name: \"redhat-operators-dockercfg-lp4jk\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-shjn2 current-pod.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:02.106088440Z time="2026-02-23T13:06:02Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-shjn2 current-pod.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:02.106088440Z time="2026-02-23T13:06:02Z" level=info msg="registry pods invalid, need to overwrite" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj 2026-02-23T13:06:02.106259194Z time="2026-02-23T13:06:02Z" level=info msg="deleting current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj pod.name=redhat-operators-shjn2 pod.namespace=openshift-marketplace 2026-02-23T13:06:02.291731290Z time="2026-02-23T13:06:02Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=6DLCh 2026-02-23T13:06:02.291765991Z time="2026-02-23T13:06:02Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=6DLCh 2026-02-23T13:06:02.306551936Z time="2026-02-23T13:06:02Z" level=info msg="creating desired pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=bM8Cj pod.name= pod.namespace=openshift-marketplace 2026-02-23T13:06:02.488526764Z time="2026-02-23T13:06:02Z" level=info msg="No subscriptions were found in namespace openshift-route-controller-manager" id=SF8bq namespace=openshift-route-controller-manager 2026-02-23T13:06:02.488526764Z time="2026-02-23T13:06:02Z" level=info msg="resolving sources" id=lSi9n namespace=openshift-service-ca-operator 2026-02-23T13:06:02.488526764Z time="2026-02-23T13:06:02Z" level=info msg="checking if subscriptions need update" id=lSi9n namespace=openshift-service-ca-operator config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_current.log0000640000000000000000000001055315147050273031207 0ustar00000000000000002026-02-23T13:04:44.855560893Z I0223 13:04:44.855361 1 observer_polling.go:159] Starting file observer 2026-02-23T13:04:44.855790830Z I0223 13:04:44.855772 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-23T13:04:44.856444149Z I0223 13:04:44.856389 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T13:04:44.856444149Z I0223 13:04:44.856420 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:04:44.857135989Z I0223 13:04:44.857035 1 observer_polling.go:159] Starting file observer 2026-02-23T13:05:40.308183146Z I0223 13:05:40.307637 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-23T13:05:40.809289691Z I0223 13:05:40.809222 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T13:05:40.809289691Z W0223 13:05:40.809271 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:40.809289691Z W0223 13:05:40.809278 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:40.809289691Z W0223 13:05:40.809282 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T13:05:40.809322652Z W0223 13:05:40.809286 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T13:05:40.809322652Z W0223 13:05:40.809290 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T13:05:40.809322652Z W0223 13:05:40.809292 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825383 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825435 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825459 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825487 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825626 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825632 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825675 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825701 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:05:40.826294852Z I0223 13:05:40.825737 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:40.927290575Z I0223 13:05:40.926371 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:40.927290575Z I0223 13:05:40.926442 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T13:05:40.931274916Z I0223 13:05:40.928404 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:46.371032327Z I0223 13:05:46.370447 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T13:05:46.371032327Z I0223 13:05:46.370837 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-drk2j/etcd-operator_previous.log0000640000000000000000000004101015147050273031371 0ustar00000000000000002026-02-23T13:02:33.203513659Z I0223 13:02:33.201475 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201476 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201485 1 base_controller.go:181] Shutting down DefragController ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201494 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201494 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201507 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201501 1 base_controller.go:181] Shutting down FSyncController ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201522 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201531 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201541 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201542 1 base_controller.go:123] Shutting down worker of DefragController controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201545 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201446 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201560 1 controller_manager.go:54] GuardController controller terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201425 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201570 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201578 1 base_controller.go:113] All Installer workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201582 1 controller_manager.go:54] Installer controller terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201592 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201593 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201601 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201597 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201607 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201589 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201645 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201668 1 base_controller.go:181] Shutting down EtcdCertCleanerController ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201439 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201514 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201702 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201707 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201513 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201718 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201758 1 base_controller.go:113] All ScriptController workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201761 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201775 1 base_controller.go:113] All etcd workers have been terminated 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201794 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201826 1 base_controller.go:181] Shutting down EtcdMembersController ... 2026-02-23T13:02:33.203513659Z I0223 13:02:33.201898 1 base_controller.go:123] Shutting down worker of EtcdCertCleanerController controller ... 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201907 1 base_controller.go:113] All EtcdCertCleanerController workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201914 1 base_controller.go:123] Shutting down worker of FSyncController controller ... 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201926 1 base_controller.go:113] All FSyncController workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201962 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201971 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201603 1 controller_manager.go:54] etcd-Node controller terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201484 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-23T13:02:33.203644003Z I0223 13:02:33.202116 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.202127 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201556 1 base_controller.go:113] All DefragController workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201523 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-23T13:02:33.203644003Z I0223 13:02:33.202155 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.202162 1 controller_manager.go:54] PruneController controller terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201614 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201422 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-23T13:02:33.203644003Z I0223 13:02:33.202187 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.202193 1 controller_manager.go:54] RevisionController controller terminated 2026-02-23T13:02:33.203644003Z I0223 13:02:33.201715 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-23T13:02:33.203644003Z E0223 13:02:33.202969 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-23T13:02:33.204199660Z I0223 13:02:33.204125 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-23T13:02:33.204199660Z I0223 13:02:33.204158 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-23T13:02:33.204199660Z I0223 13:02:33.204168 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-23T13:02:33.204996423Z E0223 13:02:33.204936 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd\": context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-23T13:02:33.206170658Z I0223 13:02:33.206111 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-02-23T13:02:33.206170658Z I0223 13:02:33.206147 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-02-23T13:02:34.940291483Z I0223 13:02:34.939133 1 etcdcli_pool.go:70] creating a new cached client 2026-02-23T13:02:37.828911667Z I0223 13:02:37.828762 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="9ec29a45a89096a9d86a1cb800fb3e8ab6ef54073c323855b9ba5dfa998c5711") 2026-02-23T13:02:37.828911667Z I0223 13:02:37.828798 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-02-23T13:02:37.828911667Z I0223 13:02:37.828864 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="96d6551d16367bc0f04249db1b383aa70bf9469ba522679688e7763de9fc1481") 2026-02-23T13:02:37.828911667Z I0223 13:02:37.828871 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-02-23T13:02:37.829054141Z I0223 13:02:37.829005 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="35744e7062bcf8bf1fe903d91a6cd834497114a2530fbfa944bfeef2cbb0ac1e") 2026-02-23T13:02:37.829054141Z I0223 13:02:37.829027 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-02-23T13:02:37.829116173Z I0223 13:02:37.829084 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="492ae3ba3d8bfc06c7792e2bba49889fa863b7a539dbe78029705a89b3184ef1") 2026-02-23T13:02:37.829116173Z I0223 13:02:37.829097 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-02-23T13:02:37.829208546Z I0223 13:02:37.829164 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="f4871101df27ffc20916ae1dc1735a0293adf5226c3f3357b148e8c7f4db9d48") 2026-02-23T13:02:37.829208546Z I0223 13:02:37.829178 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-02-23T13:02:37.829291938Z I0223 13:02:37.829258 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="df1175e35c08556f08dd53248f735d68ceb24453f89c5feb712ad1e5dec4ed93") 2026-02-23T13:02:37.829291938Z I0223 13:02:37.829273 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-02-23T13:02:38.199758502Z I0223 13:02:38.199500 1 observer_polling.go:162] Shutting down file observer 2026-02-23T13:02:47.763771773Z W0223 13:02:47.763676 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-23T13:02:47.765944137Z E0223 13:02:47.765895 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-02-23T13:02:47.767162153Z I0223 13:02:47.767106 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-02-23T13:02:47.767178363Z I0223 13:02:47.767159 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-02-23T13:02:47.960440067Z W0223 13:02:47.960340 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-23T13:02:48.010626275Z W0223 13:02:48.010523 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-23T13:02:49.941655490Z W0223 13:02:49.941542 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-23T13:02:49.942120633Z E0223 13:02:49.942054 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-02-23T13:02:49.943437972Z I0223 13:02:49.943364 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-02-23T13:02:49.943476023Z I0223 13:02:49.943436 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-02-23T13:02:51.961309666Z I0223 13:02:51.961182 1 etcdcli_pool.go:70] creating a new cached client 2026-02-23T13:02:52.011425693Z I0223 13:02:52.011331 1 etcdcli_pool.go:70] creating a new cached client 2026-02-23T13:03:06.962770144Z W0223 13:03:06.962637 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-23T13:03:06.964170505Z E0223 13:03:06.964100 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-02-23T13:03:06.965538264Z I0223 13:03:06.965442 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-02-23T13:03:06.965569135Z I0223 13:03:06.965541 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-02-23T13:03:07.013017122Z W0223 13:03:07.012904 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-23T13:03:07.013017122Z E0223 13:03:07.012982 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-02-23T13:03:07.014383442Z I0223 13:03:07.014281 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-02-23T13:03:07.014414453Z I0223 13:03:07.014371 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-02-23T13:03:07.203289494Z E0223 13:03:07.203165 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-23T13:03:07.203289494Z W0223 13:03:07.203210 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j.json0000640000000000000000000001576315147050273024131 0ustar0000000000000000{"metadata":{"name":"etcd-operator-545bf96f4d-drk2j","generateName":"etcd-operator-545bf96f4d-","namespace":"openshift-etcd-operator","uid":"03da8bbe-c1b1-4f3f-acec-d1dd0c8afae4","resourceVersion":"9650","creationTimestamp":"2026-02-23T12:59:09Z","labels":{"app":"etcd-operator","pod-template-hash":"545bf96f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-545bf96f4d","uid":"0a7a5d1f-ca13-43f1-b5c6-1e1a56a64888","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-kdnn5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-kdnn5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T13:01:17Z","finishedAt":"2026-02-23T13:03:07Z","containerID":"cri-o://f95ba38760f7dc259e69f00ebd4eabf8bd09b35de53d8f84cbae1abd114eb259"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","containerID":"cri-o://7ae02e0df64340d5796187bee35b0a226bdb253a9ea0b0f2d5eec150f3a915b5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-kdnn5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002744515147050273034102 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-6dcf85cb46-cmf752026-02-23T13:01:53.414114106Z W0223 13:01:53.413925 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-23T13:01:53.414640132Z I0223 13:01:53.414548 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771851713 cert, and key in /tmp/serving-cert-871466850/serving-signer.crt, /tmp/serving-cert-871466850/serving-signer.key 2026-02-23T13:01:53.901025497Z I0223 13:01:53.900888 1 observer_polling.go:159] Starting file observer 2026-02-23T13:01:54.485029881Z I0223 13:01:54.484402 1 builder.go:304] check-endpoints version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-23T13:01:54.486846755Z I0223 13:01:54.486798 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-871466850/tls.crt::/tmp/serving-cert-871466850/tls.key" 2026-02-23T13:01:54.899348673Z I0223 13:01:54.898126 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-23T13:01:54.900751315Z I0223 13:01:54.900152 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-23T13:01:54.900751315Z I0223 13:01:54.900175 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-23T13:01:54.900751315Z I0223 13:01:54.900196 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-23T13:01:54.900751315Z I0223 13:01:54.900203 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-23T13:01:54.905046864Z I0223 13:01:54.905004 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T13:01:54.905046864Z I0223 13:01:54.905027 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-23T13:01:54.905046864Z W0223 13:01:54.905034 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:01:54.905046864Z W0223 13:01:54.905040 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:01:54.905075375Z W0223 13:01:54.905047 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T13:01:54.905075375Z W0223 13:01:54.905051 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T13:01:54.905075375Z W0223 13:01:54.905055 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T13:01:54.905075375Z W0223 13:01:54.905059 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119023 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-871466850/tls.crt::/tmp/serving-cert-871466850/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771851713\" (2026-02-23 13:01:52 +0000 UTC to 2026-03-25 13:01:53 +0000 UTC (now=2026-02-23 13:01:55.118961523 +0000 UTC))" 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119300 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851714\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851714\" (2026-02-23 12:01:54 +0000 UTC to 2027-02-23 12:01:54 +0000 UTC (now=2026-02-23 13:01:55.119264482 +0000 UTC))" 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119337 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119385 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119429 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119471 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119524 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-871466850/tls.crt::/tmp/serving-cert-871466850/tls.key" 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119579 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119687 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119704 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119727 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:01:55.119752167Z I0223 13:01:55.119736 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:01:55.119866350Z I0223 13:01:55.119828 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:01:55.119866350Z I0223 13:01:55.119839 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:01:55.126000564Z I0223 13:01:55.125923 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:01:55.126000564Z I0223 13:01:55.125949 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:01:55.126461468Z I0223 13:01:55.126418 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:01:55.220083827Z I0223 13:01:55.219964 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:01:55.220083827Z I0223 13:01:55.220027 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T13:01:55.220083827Z I0223 13:01:55.220059 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:01:55.220523431Z I0223 13:01:55.220456 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 12:50:50 +0000 UTC to 2026-02-24 12:50:50 +0000 UTC (now=2026-02-23 13:01:55.220392107 +0000 UTC))" 2026-02-23T13:01:55.220851500Z I0223 13:01:55.220791 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-871466850/tls.crt::/tmp/serving-cert-871466850/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771851713\" (2026-02-23 13:01:52 +0000 UTC to 2026-03-25 13:01:53 +0000 UTC (now=2026-02-23 13:01:55.220753257 +0000 UTC))" 2026-02-23T13:01:55.221116948Z I0223 13:01:55.221074 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851714\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851714\" (2026-02-23 12:01:54 +0000 UTC to 2027-02-23 12:01:54 +0000 UTC (now=2026-02-23 13:01:55.221041386 +0000 UTC))" 2026-02-23T13:01:55.221476479Z I0223 13:01:55.221422 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 12:43:50 +0000 UTC to 2036-02-21 12:43:50 +0000 UTC (now=2026-02-23 13:01:55.221387406 +0000 UTC))" 2026-02-23T13:01:55.221502550Z I0223 13:01:55.221477 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2026-02-24 12:50:52 +0000 UTC (now=2026-02-23 13:01:55.221451708 +0000 UTC))" 2026-02-23T13:01:55.221533661Z I0223 13:01:55.221516 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2027-02-23 12:50:52 +0000 UTC (now=2026-02-23 13:01:55.22149231 +0000 UTC))" 2026-02-23T13:01:55.221597793Z I0223 13:01:55.221566 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2027-02-23 12:50:52 +0000 UTC (now=2026-02-23 13:01:55.221529721 +0000 UTC))" 2026-02-23T13:01:55.221651194Z I0223 13:01:55.221610 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 12:50:49 +0000 UTC to 2036-02-21 12:50:49 +0000 UTC (now=2026-02-23 13:01:55.221585422 +0000 UTC))" 2026-02-23T13:01:55.221703456Z I0223 13:01:55.221662 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 12:50:50 +0000 UTC to 2026-02-24 12:50:50 +0000 UTC (now=2026-02-23 13:01:55.221627534 +0000 UTC))" 2026-02-23T13:01:55.221998555Z I0223 13:01:55.221950 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-871466850/tls.crt::/tmp/serving-cert-871466850/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771851713\" (2026-02-23 13:01:52 +0000 UTC to 2026-03-25 13:01:53 +0000 UTC (now=2026-02-23 13:01:55.221917792 +0000 UTC))" 2026-02-23T13:01:55.222356085Z I0223 13:01:55.222297 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851714\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851714\" (2026-02-23 12:01:54 +0000 UTC to 2027-02-23 12:01:54 +0000 UTC (now=2026-02-23 13:01:55.222233502 +0000 UTC))" 2026-02-23T13:01:55.503423439Z I0223 13:01:55.503345 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-23T13:01:55.859208022Z I0223 13:01:55.859118 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:01:55.904179407Z I0223 13:01:55.904070 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-23T13:01:55.904179407Z I0223 13:01:55.904122 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-6dcf85cb46-cmf75/openshift-apiserver_current.log0000640000000000000000000011723015147050273031075 0ustar00000000000000002026-02-23T13:05:45.952883267Z E0223 13:05:45.952856 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.952893958Z E0223 13:05:45.952645 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953047522Z E0223 13:05:45.952528 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953118823Z E0223 13:05:45.953093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953130964Z E0223 13:05:45.952535 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953180075Z E0223 13:05:45.953157 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953191925Z E0223 13:05:45.952636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953368240Z E0223 13:05:45.953347 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953423381Z E0223 13:05:45.952504 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953548364Z E0223 13:05:45.953101 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953641357Z E0223 13:05:45.952594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.953800071Z E0223 13:05:45.953394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.965860607Z E0223 13:05:45.965795 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.966318548Z E0223 13:05:45.966278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.966597515Z E0223 13:05:45.966562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.966855962Z E0223 13:05:45.966821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967008646Z E0223 13:05:45.966963 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967104408Z E0223 13:05:45.967070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967333124Z E0223 13:05:45.967299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967395596Z E0223 13:05:45.967372 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967626661Z E0223 13:05:45.967585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967639782Z E0223 13:05:45.967622 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967868708Z E0223 13:05:45.967833 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.967918129Z E0223 13:05:45.967885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968146255Z E0223 13:05:45.968105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968230847Z E0223 13:05:45.968193 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968458653Z E0223 13:05:45.968414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968535864Z E0223 13:05:45.968499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968617827Z E0223 13:05:45.968593 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968811711Z E0223 13:05:45.968778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968823022Z E0223 13:05:45.968812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.968985056Z E0223 13:05:45.968964 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.969255793Z E0223 13:05:45.969213 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.969318224Z E0223 13:05:45.969283 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.971515810Z E0223 13:05:45.970576 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.971515810Z E0223 13:05:45.971455 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.971798817Z E0223 13:05:45.971777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.018114673Z E0223 13:05:46.017994 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.018114673Z E0223 13:05:46.018058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.030387934Z E0223 13:05:46.029106 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.030387934Z E0223 13:05:46.029175 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.041223399Z E0223 13:05:46.041111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.041314171Z E0223 13:05:46.041223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.051707995Z E0223 13:05:46.051612 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.051921340Z E0223 13:05:46.051820 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.075685853Z E0223 13:05:46.075610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.075772205Z E0223 13:05:46.075710 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.086352534Z E0223 13:05:46.086288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.086421336Z E0223 13:05:46.086376 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.096652395Z E0223 13:05:46.096577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.096870621Z E0223 13:05:46.096577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.104216807Z E0223 13:05:46.104143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.104216807Z E0223 13:05:46.104176 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.111578334Z E0223 13:05:46.111388 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.120591553Z E0223 13:05:46.120509 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.768452521Z E0223 13:05:53.768353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.768452521Z E0223 13:05:53.768424 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.768452521Z E0223 13:05:53.768430 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.768526373Z E0223 13:05:53.768435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.769182660Z E0223 13:05:53.768826 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.785740160Z E0223 13:05:53.784895 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.785740160Z E0223 13:05:53.785435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.785740160Z E0223 13:05:53.785684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.785965026Z E0223 13:05:53.785937 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.786048188Z E0223 13:05:53.786029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.812134760Z E0223 13:05:53.812081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.812134760Z E0223 13:05:53.812111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.812193801Z E0223 13:05:53.812081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.812404567Z E0223 13:05:53.812182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.812422967Z E0223 13:05:53.812396 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.838629882Z E0223 13:05:53.838541 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.838629882Z E0223 13:05:53.838568 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.838846567Z E0223 13:05:53.838808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.838864718Z E0223 13:05:53.838835 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:53.839116624Z E0223 13:05:53.839072 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.203490540Z E0223 13:05:54.203416 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.203550711Z E0223 13:05:54.203494 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.203614443Z E0223 13:05:54.203416 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.203659374Z E0223 13:05:54.203617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.203932951Z E0223 13:05:54.203855 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.642616571Z E0223 13:05:54.642553 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.642692353Z E0223 13:05:54.642671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.642947050Z E0223 13:05:54.642908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.643105784Z E0223 13:05:54.643088 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.643593646Z E0223 13:05:54.643236 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.826997180Z E0223 13:05:54.826776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.826997180Z E0223 13:05:54.826802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.827211535Z E0223 13:05:54.827182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.832137310Z E0223 13:05:54.832079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.832844768Z E0223 13:05:54.832652 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.990049847Z E0223 13:05:54.989881 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.990829347Z E0223 13:05:54.990407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.990829347Z E0223 13:05:54.990637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.990882978Z E0223 13:05:54.990848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:54.991117224Z E0223 13:05:54.991047 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:55.363708178Z E0223 13:05:55.363587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:55.363708178Z E0223 13:05:55.363645 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:55.363708178Z E0223 13:05:55.363645 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:55.363830961Z E0223 13:05:55.363786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:55.363860402Z E0223 13:05:55.363587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315147050273040265 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-6wk862026-02-23T13:04:44.707674085Z I0223 13:04:44.707497 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T13:04:44.707934502Z I0223 13:04:44.707897 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:04:44.708886120Z I0223 13:04:44.708820 1 observer_polling.go:159] Starting file observer 2026-02-23T13:05:40.329345253Z I0223 13:05:40.326817 1 builder.go:304] openshift-apiserver-operator version - 2026-02-23T13:05:40.818713510Z I0223 13:05:40.818566 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T13:05:40.818713510Z W0223 13:05:40.818606 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:40.818713510Z W0223 13:05:40.818613 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:40.818713510Z W0223 13:05:40.818618 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T13:05:40.818713510Z W0223 13:05:40.818622 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T13:05:40.818713510Z W0223 13:05:40.818625 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T13:05:40.818713510Z W0223 13:05:40.818629 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T13:05:40.831355721Z I0223 13:05:40.831297 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T13:05:40.831387651Z I0223 13:05:40.831379 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T13:05:40.831422542Z I0223 13:05:40.831404 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T13:05:40.831488384Z I0223 13:05:40.831451 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T13:05:40.831604457Z I0223 13:05:40.831585 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T13:05:40.831718770Z I0223 13:05:40.831699 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:05:40.831718770Z I0223 13:05:40.831710 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:40.831738960Z I0223 13:05:40.831726 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:05:40.831738960Z I0223 13:05:40.831732 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:40.931838880Z I0223 13:05:40.931754 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:40.931838880Z I0223 13:05:40.931803 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:40.931838880Z I0223 13:05:40.931795 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T13:05:46.370788881Z I0223 13:05:46.370617 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T13:05:46.372335200Z I0223 13:05:46.371131 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... openshift-apiserver-operator_previous.log0000640000000000000000000004144715147050273040476 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-6wk862026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-23T13:02:28.142705006Z > 2026-02-23T13:02:28.144354285Z I0223 13:02:28.144297 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:02:29.940949989Z E0223 13:02:29.940882 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-23T13:02:29.940949989Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-23T13:02:29.940949989Z > 2026-02-23T13:02:48.469306737Z I0223 13:02:48.469183 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="e736348b5d0b36bff93f6ecaa0730e43e05e64107fcc354040ee1ee8aac5336c") 2026-02-23T13:02:48.469306737Z W0223 13:02:48.469293 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-02-23T13:02:48.469470292Z I0223 13:02:48.469433 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="ff8c0895803839e707dffe695d314f57f034a31dbe85c01bf504816cf702291e") 2026-02-23T13:02:48.469619466Z I0223 13:02:48.469557 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-02-23T13:02:48.469645507Z I0223 13:02:48.469621 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-02-23T13:02:48.469645507Z I0223 13:02:48.469636 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-23T13:02:48.469709199Z I0223 13:02:48.469624 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-02-23T13:02:48.469709199Z I0223 13:02:48.469678 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-02-23T13:02:48.469709199Z I0223 13:02:48.469679 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-02-23T13:02:48.469709199Z I0223 13:02:48.469697 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-02-23T13:02:48.469732080Z I0223 13:02:48.469710 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-02-23T13:02:48.469732080Z I0223 13:02:48.469724 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-02-23T13:02:48.469748520Z I0223 13:02:48.469715 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-02-23T13:02:48.469764131Z I0223 13:02:48.469738 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-23T13:02:48.469779951Z I0223 13:02:48.469759 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-02-23T13:02:48.469795752Z I0223 13:02:48.469777 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-23T13:02:48.469795752Z I0223 13:02:48.469788 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-23T13:02:48.469812172Z I0223 13:02:48.469790 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-02-23T13:02:48.469812172Z I0223 13:02:48.469802 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-02-23T13:02:48.469828463Z I0223 13:02:48.469813 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-02-23T13:02:48.469828463Z I0223 13:02:48.469822 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-02-23T13:02:48.469844323Z I0223 13:02:48.469821 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-23T13:02:48.469844323Z I0223 13:02:48.469767 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-02-23T13:02:48.469860503Z I0223 13:02:48.469840 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-23T13:02:48.469860503Z I0223 13:02:48.469845 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-02-23T13:02:48.469860503Z I0223 13:02:48.469850 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-23T13:02:48.469878254Z I0223 13:02:48.469854 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-02-23T13:02:48.469878254Z I0223 13:02:48.469861 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-23T13:02:48.469894384Z I0223 13:02:48.469874 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-23T13:02:48.469894384Z I0223 13:02:48.469876 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-02-23T13:02:48.469894384Z I0223 13:02:48.469834 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-02-23T13:02:48.469917865Z I0223 13:02:48.469890 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-02-23T13:02:48.469917865Z I0223 13:02:48.469894 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-23T13:02:48.469917865Z I0223 13:02:48.469895 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-02-23T13:02:48.469917865Z I0223 13:02:48.469908 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-02-23T13:02:48.469936776Z I0223 13:02:48.469913 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-02-23T13:02:48.469936776Z I0223 13:02:48.469918 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-23T13:02:48.469936776Z I0223 13:02:48.469925 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-02-23T13:02:48.469954026Z I0223 13:02:48.469939 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-02-23T13:02:48.469969487Z I0223 13:02:48.469955 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-02-23T13:02:48.469988807Z I0223 13:02:48.469979 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-02-23T13:02:48.470058269Z I0223 13:02:48.470012 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-23T13:02:48.470077260Z I0223 13:02:48.470056 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-23T13:02:48.470077260Z I0223 13:02:48.470043 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:02:48.470182203Z I0223 13:02:48.470145 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-23T13:02:48.470301736Z I0223 13:02:48.470231 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2378364462/tls.crt::/tmp/serving-cert-2378364462/tls.key" 2026-02-23T13:02:48.470395609Z I0223 13:02:48.470341 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-23T13:02:48.470395609Z E0223 13:02:48.470359 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.template.openshift.io\": context canceled" 2026-02-23T13:02:48.470415170Z I0223 13:02:48.469824 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-02-23T13:02:48.470415170Z I0223 13:02:48.470272 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:02:48.470463781Z I0223 13:02:48.470365 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-23T13:02:48.470480752Z I0223 13:02:48.470462 1 builder.go:335] server exited 2026-02-23T13:02:48.470574014Z I0223 13:02:48.470534 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-02-23T13:02:48.470574014Z I0223 13:02:48.470561 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-02-23T13:02:48.470592435Z I0223 13:02:48.470575 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-02-23T13:02:48.470592435Z I0223 13:02:48.470581 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-02-23T13:02:48.470618866Z I0223 13:02:48.470586 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-02-23T13:02:48.470618866Z I0223 13:02:48.470591 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-02-23T13:02:48.470618866Z I0223 13:02:48.470587 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-02-23T13:02:48.470618866Z I0223 13:02:48.470605 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-02-23T13:02:48.470638106Z I0223 13:02:48.470616 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-02-23T13:02:48.470638106Z I0223 13:02:48.470611 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-02-23T13:02:48.470638106Z I0223 13:02:48.470622 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-02-23T13:02:48.470665577Z I0223 13:02:48.469759 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-02-23T13:02:48.470665577Z I0223 13:02:48.470631 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-02-23T13:02:48.470665577Z I0223 13:02:48.470636 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-02-23T13:02:48.470665577Z I0223 13:02:48.470654 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-02-23T13:02:48.470682948Z I0223 13:02:48.470640 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-02-23T13:02:48.470682948Z I0223 13:02:48.470658 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-02-23T13:02:48.470682948Z I0223 13:02:48.470666 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-02-23T13:02:48.470791411Z I0223 13:02:48.470669 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-02-23T13:02:48.470809591Z I0223 13:02:48.470786 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-02-23T13:02:48.471515942Z I0223 13:02:48.471453 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-02-23T13:02:48.471515942Z I0223 13:02:48.471492 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-02-23T13:02:48.473616984Z E0223 13:02:48.473540 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:48.474943323Z I0223 13:02:48.474868 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-02-23T13:02:48.474943323Z I0223 13:02:48.474930 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-02-23T13:02:53.468571737Z I0223 13:02:53.468475 1 observer_polling.go:162] Shutting down file observer 2026-02-23T13:03:22.477171586Z E0223 13:03:22.477056 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-23T13:03:22.477171586Z W0223 13:03:22.477118 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-6wk86.json0000640000000000000000000001443115147050273030210 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-8586dccc9b-6wk86","generateName":"openshift-apiserver-operator-8586dccc9b-","namespace":"openshift-apiserver-operator","uid":"ae1799b6-85b0-4aed-8835-35cb3d8d1109","resourceVersion":"9657","creationTimestamp":"2026-02-23T12:59:08Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"8586dccc9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-8586dccc9b","uid":"be672104-66af-4a32-8a37-2adfe649401f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-lmw9r","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lmw9r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T13:01:17Z","finishedAt":"2026-02-23T13:03:22Z","containerID":"cri-o://8ede5ecb3a272a47d1a15ebb39f7a70622cc8eaa31a144f09ad6e73baceca956"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","containerID":"cri-o://2232814e0e6f0bab57129339d23cb902f8963539e1dee1b616d27df4af9358d9","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lmw9r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515147050273042614 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-j97h82026-02-23T13:04:44.904186023Z I0223 13:04:44.903981 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T13:04:44.904186023Z I0223 13:04:44.904141 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:04:44.904653597Z I0223 13:04:44.904596 1 observer_polling.go:159] Starting file observer 2026-02-23T13:05:40.306964955Z I0223 13:05:40.301716 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-23T13:05:40.741659025Z I0223 13:05:40.741601 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T13:05:40.741659025Z W0223 13:05:40.741635 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:40.741659025Z W0223 13:05:40.741642 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:40.741659025Z W0223 13:05:40.741649 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T13:05:40.741659025Z W0223 13:05:40.741653 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T13:05:40.741699196Z W0223 13:05:40.741656 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T13:05:40.741699196Z W0223 13:05:40.741661 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T13:05:40.749838642Z I0223 13:05:40.749787 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T13:05:40.749872913Z I0223 13:05:40.749855 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T13:05:40.749882373Z I0223 13:05:40.749874 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T13:05:40.749944705Z I0223 13:05:40.749916 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T13:05:40.750052958Z I0223 13:05:40.750032 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T13:05:40.750185821Z I0223 13:05:40.750164 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:05:40.750185821Z I0223 13:05:40.750174 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:40.750197201Z I0223 13:05:40.750187 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:05:40.750197201Z I0223 13:05:40.750193 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:40.851481981Z I0223 13:05:40.850926 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:40.851481981Z I0223 13:05:40.850936 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T13:05:40.851481981Z I0223 13:05:40.850985 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:46.373693125Z I0223 13:05:46.372056 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T13:05:46.373693125Z I0223 13:05:46.372500 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... kube-scheduler-operator-container_previous.log0000640000000000000000000004526315147050273043021 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-j97h82026-02-23T13:02:15.203326110Z W0223 13:02:15.201758 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:02:15.203326110Z W0223 13:02:15.201765 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:02:15.203326110Z W0223 13:02:15.201771 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-23T13:02:15.536660660Z I0223 13:02:15.536578 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:02:15.537179395Z I0223 13:02:15.537145 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:34Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:02:15.880802468Z I0223 13:02:15.880705 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"c92126f5-363f-4504-9415-0a4ecb0507b7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5" 2026-02-23T13:02:17.716948717Z I0223 13:02:17.716871 1 request.go:700] Waited for 1.118089957s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-02-23T13:02:17.927346445Z I0223 13:02:17.927061 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"c92126f5-363f-4504-9415-0a4ecb0507b7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-5-master-0 -n openshift-kube-scheduler because it was missing 2026-02-23T13:02:18.729292780Z I0223 13:02:18.728354 1 request.go:700] Waited for 1.20274779s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/serving-cert 2026-02-23T13:02:19.120957697Z I0223 13:02:19.120875 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Pending phase 2026-02-23T13:02:19.917460041Z I0223 13:02:19.917344 1 request.go:700] Waited for 1.174679414s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps/kube-scheduler-pod 2026-02-23T13:02:20.923112877Z I0223 13:02:20.918378 1 request.go:700] Waited for 1.194787366s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/openshift-kube-scheduler-master-0 2026-02-23T13:02:21.321039358Z I0223 13:02:21.320713 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-23T13:02:22.317225205Z I0223 13:02:22.317135 1 request.go:700] Waited for 1.063561622s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-02-23T13:02:23.121168109Z I0223 13:02:23.121087 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-23T13:02:48.133304149Z I0223 13:02:48.133172 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="2b9d25258445ace7bd6e0f22ed911d622c25483728204a1f112193cc189b6f3f") 2026-02-23T13:02:48.133304149Z W0223 13:02:48.133279 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-02-23T13:02:48.133490974Z I0223 13:02:48.133431 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="d0b25d608a6393075c997a32391cb73b3d29201d9915d75745cc1719118744d0") 2026-02-23T13:02:48.133589667Z I0223 13:02:48.133523 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-23T13:02:48.133646779Z I0223 13:02:48.133603 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-02-23T13:02:48.133664710Z I0223 13:02:48.133654 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-02-23T13:02:48.133749002Z I0223 13:02:48.133718 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-23T13:02:48.133749002Z I0223 13:02:48.133730 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-23T13:02:48.133770003Z I0223 13:02:48.133745 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-02-23T13:02:48.133770003Z I0223 13:02:48.133738 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-02-23T13:02:48.133786853Z I0223 13:02:48.133775 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-23T13:02:48.133786853Z I0223 13:02:48.133778 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-02-23T13:02:48.133803664Z I0223 13:02:48.133793 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-02-23T13:02:48.133856815Z I0223 13:02:48.133821 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-02-23T13:02:48.133959168Z I0223 13:02:48.133925 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-02-23T13:02:48.133959168Z I0223 13:02:48.133953 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-02-23T13:02:48.134004410Z I0223 13:02:48.133975 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-02-23T13:02:48.134004410Z I0223 13:02:48.133997 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-23T13:02:48.134022330Z I0223 13:02:48.134007 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-02-23T13:02:48.134041841Z I0223 13:02:48.134028 1 base_controller.go:181] Shutting down GuardController ... 2026-02-23T13:02:48.134097012Z I0223 13:02:48.134063 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-02-23T13:02:48.134097012Z I0223 13:02:48.134085 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-02-23T13:02:48.134127113Z I0223 13:02:48.134092 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-23T13:02:48.134127113Z I0223 13:02:48.134118 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-02-23T13:02:48.134144124Z I0223 13:02:48.134120 1 controller_manager.go:54] GuardController controller terminated 2026-02-23T13:02:48.134144124Z I0223 13:02:48.134105 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-02-23T13:02:48.134160924Z I0223 13:02:48.134062 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-02-23T13:02:48.134177375Z I0223 13:02:48.134156 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-02-23T13:02:48.134177375Z I0223 13:02:48.134162 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-02-23T13:02:48.134193695Z I0223 13:02:48.134171 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-02-23T13:02:48.134193695Z I0223 13:02:48.134163 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-02-23T13:02:48.134193695Z I0223 13:02:48.134146 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-02-23T13:02:48.134212466Z I0223 13:02:48.134180 1 base_controller.go:181] Shutting down PruneController ... 2026-02-23T13:02:48.134212466Z I0223 13:02:48.134195 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-02-23T13:02:48.134212466Z I0223 13:02:48.134203 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-23T13:02:48.134230496Z I0223 13:02:48.134209 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-23T13:02:48.134230496Z I0223 13:02:48.134218 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-02-23T13:02:48.134273207Z I0223 13:02:48.134225 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-02-23T13:02:48.134296378Z I0223 13:02:48.134234 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-02-23T13:02:48.134296378Z I0223 13:02:48.134271 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-23T13:02:48.134296378Z I0223 13:02:48.134282 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-23T13:02:48.134314239Z I0223 13:02:48.134292 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-23T13:02:48.134314239Z I0223 13:02:48.134288 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-02-23T13:02:48.134314239Z I0223 13:02:48.134304 1 controller_manager.go:54] PruneController controller terminated 2026-02-23T13:02:48.134331449Z I0223 13:02:48.134186 1 base_controller.go:181] Shutting down Installer ... 2026-02-23T13:02:48.134331449Z I0223 13:02:48.134324 1 base_controller.go:113] All Installer workers have been terminated 2026-02-23T13:02:48.134347920Z I0223 13:02:48.134333 1 controller_manager.go:54] Installer controller terminated 2026-02-23T13:02:48.134347920Z I0223 13:02:48.134334 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-23T13:02:48.134363800Z I0223 13:02:48.134347 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-23T13:02:48.134392371Z I0223 13:02:48.134364 1 controller_manager.go:54] RevisionController controller terminated 2026-02-23T13:02:48.134392371Z I0223 13:02:48.134368 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-02-23T13:02:48.134392371Z I0223 13:02:48.134350 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-23T13:02:48.134392371Z I0223 13:02:48.134310 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-02-23T13:02:48.134410572Z I0223 13:02:48.134135 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-23T13:02:48.134469373Z I0223 13:02:48.134430 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-23T13:02:48.134583507Z I0223 13:02:48.134444 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-02-23T13:02:48.134583507Z I0223 13:02:48.133927 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-02-23T13:02:48.134583507Z I0223 13:02:48.134575 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-23T13:02:48.134607277Z I0223 13:02:48.134593 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-23T13:02:48.134667269Z I0223 13:02:48.134632 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-23T13:02:48.134667269Z I0223 13:02:48.134653 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:02:48.134685150Z I0223 13:02:48.134671 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-02-23T13:02:48.134700580Z I0223 13:02:48.134683 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-23T13:02:48.134700580Z I0223 13:02:48.134688 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-02-23T13:02:48.134760342Z I0223 13:02:48.134719 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-23T13:02:48.134760342Z I0223 13:02:48.134746 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:02:48.134778072Z I0223 13:02:48.134761 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-23T13:02:48.134827184Z I0223 13:02:48.134775 1 builder.go:335] server exited 2026-02-23T13:02:48.134846764Z I0223 13:02:48.134835 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-335050723/tls.crt::/tmp/serving-cert-335050723/tls.key" 2026-02-23T13:02:48.134862405Z I0223 13:02:48.134838 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-23T13:02:48.134913976Z I0223 13:02:48.134658 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-02-23T13:02:48.134930977Z I0223 13:02:48.134907 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-02-23T13:02:48.134930977Z I0223 13:02:48.134638 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-23T13:02:48.134947067Z I0223 13:02:48.134934 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-23T13:02:48.134962428Z I0223 13:02:48.134947 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-02-23T13:02:48.136092521Z E0223 13:02:48.136017 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-23T13:02:48.137198924Z I0223 13:02:48.137140 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-23T13:02:48.137198924Z I0223 13:02:48.137160 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-23T13:02:48.137198924Z I0223 13:02:48.137174 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-23T13:02:48.139275595Z E0223 13:02:48.139196 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler\": context canceled, \"assets/kube-scheduler/leader-election-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/scheduler-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-23T13:02:48.140510601Z I0223 13:02:48.140446 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-02-23T13:02:48.140510601Z I0223 13:02:48.140488 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-02-23T13:02:53.133339722Z I0223 13:02:53.133209 1 observer_polling.go:162] Shutting down file observer 2026-02-23T13:03:22.139695111Z E0223 13:03:22.139569 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-23T13:03:22.139695111Z W0223 13:03:22.139678 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-j97h8.json0000640000000000000000000001365715147050273031657 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-77cd4d9559-j97h8","generateName":"openshift-kube-scheduler-operator-77cd4d9559-","namespace":"openshift-kube-scheduler-operator","uid":"0a80d5ac-27ce-4ba9-809e-28c86b80163b","resourceVersion":"9623","creationTimestamp":"2026-02-23T12:59:07Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"77cd4d9559"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-77cd4d9559","uid":"6de1b4e0-0ecc-4db5-ac33-54b11ff3b022","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T13:01:17Z","finishedAt":"2026-02-23T13:03:22Z","containerID":"cri-o://1c78631b268af69806ac6e44c535cf690809e56173b2809b3ab9b30ce469dd12"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://c9ddc1a2cc51a7e5f148d418473bbc98fa1d4f5f8982eb1a143851093791dd61","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-5-master-0/installer_current.log0000640000000000000000000001275415147050273027176 0ustar00000000000000002026-02-23T13:02:20.022992390Z I0223 13:02:20.022735 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc0004545a0 cert-secrets:0xc0004540a0 configmaps:0xc000403720 namespace:0xc000403360 optional-configmaps:0xc0004039a0 optional-secrets:0xc000403860 pod:0xc0004034a0 pod-manifest-dir:0xc000403c20 resource-dir:0xc000403ae0 revision:0xc000403220 secrets:0xc0004035e0 v:0xc000455d60] [0xc000455d60 0xc000403220 0xc000403360 0xc0004034a0 0xc000403ae0 0xc000403c20 0xc000403720 0xc0004039a0 0xc000403860 0xc0004035e0 0xc0004545a0 0xc0004540a0] [] map[cert-configmaps:0xc0004541e0 cert-dir:0xc0004545a0 cert-secrets:0xc0004540a0 configmaps:0xc000403720 help:0xc00058c820 kubeconfig:0xc0004030e0 log-flush-frequency:0xc000455c20 namespace:0xc000403360 optional-cert-configmaps:0xc000454460 optional-cert-secrets:0xc000454320 optional-configmaps:0xc0004039a0 optional-secrets:0xc000403860 pod:0xc0004034a0 pod-manifest-dir:0xc000403c20 pod-manifests-lock-file:0xc000403ea0 resource-dir:0xc000403ae0 revision:0xc000403220 secrets:0xc0004035e0 timeout-duration:0xc000403d60 v:0xc000455d60 vmodule:0xc000455ea0] [0xc0004030e0 0xc000403220 0xc000403360 0xc0004034a0 0xc0004035e0 0xc000403720 0xc000403860 0xc0004039a0 0xc000403ae0 0xc000403c20 0xc000403d60 0xc000403ea0 0xc0004540a0 0xc0004541e0 0xc000454320 0xc000454460 0xc0004545a0 0xc000455c20 0xc000455d60 0xc000455ea0 0xc00058c820] [0xc0004541e0 0xc0004545a0 0xc0004540a0 0xc000403720 0xc00058c820 0xc0004030e0 0xc000455c20 0xc000403360 0xc000454460 0xc000454320 0xc0004039a0 0xc000403860 0xc0004034a0 0xc000403c20 0xc000403ea0 0xc000403ae0 0xc000403220 0xc0004035e0 0xc000403d60 0xc000455d60 0xc000455ea0] map[104:0xc00058c820 118:0xc000455d60] [] -1 0 0xc00048de60 true 0x223d5a0 []} 2026-02-23T13:02:20.023237108Z I0223 13:02:20.023216 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0003de1a0)({ 2026-02-23T13:02:20.023237108Z KubeConfig: (string) "", 2026-02-23T13:02:20.023237108Z KubeClient: (kubernetes.Interface) , 2026-02-23T13:02:20.023237108Z Revision: (string) (len=1) "5", 2026-02-23T13:02:20.023237108Z NodeName: (string) "", 2026-02-23T13:02:20.023237108Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-23T13:02:20.023237108Z Clock: (clock.RealClock) { 2026-02-23T13:02:20.023237108Z }, 2026-02-23T13:02:20.023237108Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-23T13:02:20.023237108Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:20.023237108Z (string) (len=31) "localhost-recovery-client-token" 2026-02-23T13:02:20.023237108Z }, 2026-02-23T13:02:20.023237108Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:20.023237108Z (string) (len=12) "serving-cert" 2026-02-23T13:02:20.023237108Z }, 2026-02-23T13:02:20.023237108Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-23T13:02:20.023237108Z (string) (len=18) "kube-scheduler-pod", 2026-02-23T13:02:20.023237108Z (string) (len=6) "config", 2026-02-23T13:02:20.023237108Z (string) (len=17) "serviceaccount-ca", 2026-02-23T13:02:20.023237108Z (string) (len=20) "scheduler-kubeconfig", 2026-02-23T13:02:20.023237108Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-23T13:02:20.023237108Z }, 2026-02-23T13:02:20.023237108Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:20.023237108Z (string) (len=16) "policy-configmap" 2026-02-23T13:02:20.023237108Z }, 2026-02-23T13:02:20.023237108Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-23T13:02:20.023237108Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-23T13:02:20.023237108Z }, 2026-02-23T13:02:20.023237108Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-23T13:02:20.023237108Z CertConfigMapNamePrefixes: ([]string) , 2026-02-23T13:02:20.023237108Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-23T13:02:20.023237108Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-23T13:02:20.023237108Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T13:02:20.023237108Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T13:02:20.023237108Z Timeout: (time.Duration) 2m0s, 2026-02-23T13:02:20.023237108Z StaticPodManifestsLockFile: (string) "", 2026-02-23T13:02:20.023237108Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T13:02:20.023237108Z KubeletVersion: (string) "" 2026-02-23T13:02:20.023237108Z }) 2026-02-23T13:02:20.024642329Z I0223 13:02:20.024593 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T13:02:20.127181140Z I0223 13:02:20.127063 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T13:02:20.127181140Z I0223 13:02:20.127140 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:02:20.127181140Z I0223 13:02:20.127152 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:02:20.133556907Z I0223 13:02:20.133464 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-23T13:02:50.133781049Z I0223 13:02:50.133665 1 cmd.go:524] Getting installer pods for node master-0 2026-02-23T13:03:04.138194867Z F0223 13:03:04.138034 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-5-master-0.json0000640000000000000000000001652515147050273022663 0ustar0000000000000000{"metadata":{"name":"installer-5-master-0","namespace":"openshift-kube-scheduler","uid":"1860bead-61b8-4678-b583-c13c79575ef4","resourceVersion":"9637","creationTimestamp":"2026-02-23T13:02:17Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-5","uid":"5c5b904f-12d9-4674-8561-03846b95f337"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=5","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-fk29t"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:04:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:17Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:04:44Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:04:44Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2026-02-23T13:02:17Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"s: ([]string) (len=1 cap=1) {\n (string) (len=31) \"localhost-recovery-client-token\"\n },\n OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0223 13:02:20.024593 1 cmd.go:413] Getting controller reference for node master-0\nI0223 13:02:20.127063 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0223 13:02:20.127140 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0223 13:02:20.127152 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0223 13:02:20.133464 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0223 13:02:50.133665 1 cmd.go:524] Getting installer pods for node master-0\nF0223 13:03:04.138034 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-23T13:02:19Z","finishedAt":"2026-02-23T13:03:04Z","containerID":"cri-o://923861d3e14f9f1ed180c6fc4f602226ba1fa39cb2d6ada3746794e2192c190f"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://923861d3e14f9f1ed180c6fc4f602226ba1fa39cb2d6ada3746794e2192c190f","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004133215147050273030224 0ustar00000000000000002026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: TaintToleration 2026-02-23T13:03:49.897780106Z weight: 3 2026-02-23T13:03:49.897780106Z - name: NodeAffinity 2026-02-23T13:03:49.897780106Z weight: 2 2026-02-23T13:03:49.897780106Z - name: NodePorts 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: NodeResourcesFit 2026-02-23T13:03:49.897780106Z weight: 1 2026-02-23T13:03:49.897780106Z - name: VolumeRestrictions 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: NodeVolumeLimits 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: VolumeBinding 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: VolumeZone 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: PodTopologySpread 2026-02-23T13:03:49.897780106Z weight: 2 2026-02-23T13:03:49.897780106Z - name: InterPodAffinity 2026-02-23T13:03:49.897780106Z weight: 2 2026-02-23T13:03:49.897780106Z - name: DefaultPreemption 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z - name: NodeResourcesBalancedAllocation 2026-02-23T13:03:49.897780106Z weight: 1 2026-02-23T13:03:49.897780106Z - name: ImageLocality 2026-02-23T13:03:49.897780106Z weight: 1 2026-02-23T13:03:49.897780106Z - name: DefaultBinder 2026-02-23T13:03:49.897780106Z weight: 0 2026-02-23T13:03:49.897780106Z permit: {} 2026-02-23T13:03:49.897780106Z postBind: {} 2026-02-23T13:03:49.897780106Z postFilter: {} 2026-02-23T13:03:49.897780106Z preBind: {} 2026-02-23T13:03:49.897780106Z preEnqueue: {} 2026-02-23T13:03:49.897780106Z preFilter: {} 2026-02-23T13:03:49.897780106Z preScore: {} 2026-02-23T13:03:49.897780106Z queueSort: {} 2026-02-23T13:03:49.897780106Z reserve: {} 2026-02-23T13:03:49.897780106Z score: {} 2026-02-23T13:03:49.897780106Z schedulerName: default-scheduler 2026-02-23T13:03:49.897780106Z > 2026-02-23T13:03:49.900518816Z I0223 13:03:49.900464 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-02-23T13:03:49.900518816Z I0223 13:03:49.900491 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-02-23T13:03:49.904592534Z I0223 13:03:49.904472 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:03:49.904592534Z I0223 13:03:49.904574 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:03:49.905071928Z I0223 13:03:49.904959 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-02-23T13:03:49.905071928Z I0223 13:03:49.905046 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771851769\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771851769\" (2026-02-23 12:02:48 +0000 UTC to 2027-02-23 12:02:48 +0000 UTC (now=2026-02-23 13:03:49.904978305 +0000 UTC))" 2026-02-23T13:03:49.905441738Z I0223 13:03:49.905332 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851769\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851769\" (2026-02-23 12:02:49 +0000 UTC to 2029-02-23 12:02:49 +0000 UTC (now=2026-02-23 13:03:49.905302104 +0000 UTC))" 2026-02-23T13:03:49.905441738Z I0223 13:03:49.905420 1 secure_serving.go:213] Serving securely on [::]:10259 2026-02-23T13:03:49.905588263Z I0223 13:03:49.905538 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T13:03:49.912096412Z I0223 13:03:49.911961 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-23T13:03:49.912986907Z I0223 13:03:49.912814 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.913278046Z I0223 13:03:49.913176 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.913420920Z I0223 13:03:49.913368 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.913758420Z I0223 13:03:49.913708 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.913845272Z I0223 13:03:49.913798 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.914583474Z I0223 13:03:49.914327 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.914583474Z I0223 13:03:49.914540 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.917304283Z I0223 13:03:49.917116 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.917304283Z I0223 13:03:49.917197 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-23T13:03:49.917528369Z I0223 13:03:49.917431 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.917821108Z I0223 13:03:49.917735 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.917854889Z I0223 13:03:49.917838 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.920390062Z I0223 13:03:49.920308 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.924158572Z I0223 13:03:49.924072 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.937925821Z I0223 13:03:49.937820 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:49.942349850Z I0223 13:03:49.942222 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-02-23T13:03:50.005745600Z I0223 13:03:50.005654 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:03:50.005900884Z I0223 13:03:50.005835 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-02-23T13:03:50.006390118Z I0223 13:03:50.006294 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 12:43:50 +0000 UTC to 2036-02-21 12:43:50 +0000 UTC (now=2026-02-23 13:03:50.006221543 +0000 UTC))" 2026-02-23T13:03:50.006390118Z I0223 13:03:50.006363 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2026-02-24 12:50:52 +0000 UTC (now=2026-02-23 13:03:50.006349787 +0000 UTC))" 2026-02-23T13:03:50.006418359Z I0223 13:03:50.006397 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2027-02-23 12:50:52 +0000 UTC (now=2026-02-23 13:03:50.006384378 +0000 UTC))" 2026-02-23T13:03:50.006438290Z I0223 13:03:50.006422 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2027-02-23 12:50:52 +0000 UTC (now=2026-02-23 13:03:50.006412859 +0000 UTC))" 2026-02-23T13:03:50.006499461Z I0223 13:03:50.006445 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 12:50:49 +0000 UTC to 2036-02-21 12:50:49 +0000 UTC (now=2026-02-23 13:03:50.00643649 +0000 UTC))" 2026-02-23T13:03:50.006826811Z I0223 13:03:50.006759 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771851769\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771851769\" (2026-02-23 12:02:48 +0000 UTC to 2027-02-23 12:02:48 +0000 UTC (now=2026-02-23 13:03:50.006732268 +0000 UTC))" 2026-02-23T13:03:50.007141920Z I0223 13:03:50.007057 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851769\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851769\" (2026-02-23 12:02:49 +0000 UTC to 2029-02-23 12:02:49 +0000 UTC (now=2026-02-23 13:03:50.007034887 +0000 UTC))" 2026-02-23T13:03:55.006653075Z E0223 13:03:55.006497 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:04.041917312Z E0223 13:04:04.040960 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:11.326321140Z E0223 13:04:11.326069 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:20.120687748Z E0223 13:04:20.120540 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:29.196779894Z E0223 13:04:29.196676 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:37.711831021Z E0223 13:04:37.711609 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:46.524036266Z E0223 13:04:46.523892 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:04:54.876686041Z E0223 13:04:54.876555 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:05:03.474275503Z E0223 13:05:03.474113 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:05:11.353718218Z E0223 13:05:11.353568 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:05:20.425486653Z E0223 13:05:20.425378 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:05:40.726297425Z I0223 13:05:40.725310 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-02-23T13:05:40.726297425Z I0223 13:05:40.726030 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7b65dc9fcb-v92vx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:05:40.726297425Z I0223 13:05:40.726228 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-5fngq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:05:40.726370607Z I0223 13:05:40.726358 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-hjhz7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:05:40.727514326Z I0223 13:05:40.726450 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/collect-profiles-29530860-9f5kd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:05:56.741633639Z I0223 13:05:56.740752 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-t6gmf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:56.742898041Z I0223 13:05:56.742383 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9-48xpf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:56.744199634Z I0223 13:05:56.743829 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-sfrhg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:56.756058195Z I0223 13:05:56.755932 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-548fc9dc5-x4nbx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:56.764585521Z I0223 13:05:56.761515 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-5c7cf458b4-zkmdz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:56.766702465Z I0223 13:05:56.766096 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-mldw4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:57.331164927Z I0223 13:05:57.331073 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-ccxr7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:05:57.534268940Z I0223 13:05:57.534164 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-shjn2" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006621715147050273030427 0ustar00000000000000002026-02-23T12:59:08.018161993Z I0223 12:59:08.018017 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tzms" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.126425491Z I0223 12:59:08.124040 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-6f5488b997-28zcz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.217747727Z I0223 12:59:08.217608 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-c48c8bf7c-rvccp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.318008823Z I0223 12:59:08.317860 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.474177205Z I0223 12:59:08.473845 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-s8pzx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.534427707Z I0223 12:59:08.534045 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-6wk86" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.614034532Z I0223 12:59:08.613953 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-t9gx8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.712564018Z I0223 12:59:08.712454 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-6llwl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.815508931Z I0223 12:59:08.815364 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6fb4df594f-sx924" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:08.926043006Z I0223 12:59:08.925563 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-5cfd9759cf-lfpt7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T12:59:09.017748653Z I0223 12:59:09.017068 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:09.116418952Z I0223 12:59:09.116323 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-8c7d49845-7466r" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:09.220595362Z I0223 12:59:09.220515 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-6f47d587d6-p5488" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:09.319383705Z I0223 12:59:09.318513 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-6bb6d78bf-b2xcd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:09.417113657Z I0223 12:59:09.416962 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-6569778c84-gswst" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:09.519978479Z I0223 12:59:09.519833 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-779979bdf7-7rb6v" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T12:59:11.088087562Z I0223 12:59:11.087941 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-mtn6f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T12:59:47.253589342Z I0223 12:59:47.253137 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-fvj2t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T12:59:57.171995202Z I0223 12:59:57.171869 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-rmz8z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T12:59:57.360140258Z I0223 12:59:57.360013 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-f7cf9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T12:59:58.141161043Z I0223 12:59:58.141019 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-kq2rk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:00.136120613Z I0223 13:00:00.136047 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5f98f4f8d5-8hstp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:00:00.158212635Z I0223 13:00:00.158134 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/collect-profiles-29530860-9f5kd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:00:10.182686807Z I0223 13:00:10.182342 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-5d8dfcdc87-8mw8h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:10.199487381Z I0223 13:00:10.199387 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-jlkzw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:11.727442491Z I0223 13:00:11.727334 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-hjhz7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:00:12.757928749Z I0223 13:00:12.757839 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-shl6r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:15.337763090Z I0223 13:00:15.337696 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-4wvxd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:37.133315999Z I0223 13:00:37.132091 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-45ncb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.672073844Z I0223 13:00:59.670563 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-c48c8bf7c-rvccp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.681352273Z I0223 13:00:59.680077 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-6f5488b997-28zcz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.682427325Z I0223 13:00:59.681755 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tzms" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.682427325Z I0223 13:00:59.681983 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.682427325Z I0223 13:00:59.682309 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-6llwl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.682497687Z I0223 13:00:59.682433 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-8c7d49845-7466r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.688090675Z I0223 13:00:59.684439 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-6wk86" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.688090675Z I0223 13:00:59.686056 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-fc889cfd5-ccvpn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.688090675Z I0223 13:00:59.686145 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-545bf96f4d-drk2j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.688090675Z I0223 13:00:59.686826 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-dgldn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.688090675Z I0223 13:00:59.687397 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-6bb6d78bf-b2xcd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.689150227Z I0223 13:00:59.688630 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-6f47d587d6-p5488" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.690624861Z I0223 13:00:59.690550 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-j97h8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.693551389Z I0223 13:00:59.691889 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-779979bdf7-7rb6v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.712475 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-6569778c84-gswst" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.714645 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5499d7f7bb-g9x74" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.716224 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-t9gx8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.726769 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-s8pzx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.734422 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-jpf5n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.734828 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5f98f4f8d5-8hstp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.757331573Z I0223 13:00:59.735066 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6fb4df594f-sx924" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:00:59.783820598Z I0223 13:00:59.783739 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-qd2ns" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:18.602395055Z I0223 13:01:18.601004 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-6847bb4785-hgkrm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:19.610921787Z I0223 13:01:19.608209 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-5c85bff57-xj4vr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:19.669703420Z I0223 13:01:19.624227 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6c9b8f4d95-wfqnl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:20.790828671Z I0223 13:01:20.790689 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7966944567-cqfvc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:20.813502281Z I0223 13:01:20.812558 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7fcbbbf4f9-phpjc" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:01:21.339643469Z I0223 13:01:21.339106 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-576b4d78bd-nds57" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:22.364909834Z I0223 13:01:22.364833 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-557bf46fb-8ljrl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:01:24.173865584Z I0223 13:01:24.173604 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-557bf46fb-8ljrl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:30.590297468Z I0223 13:01:30.588273 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-568db89b47-fbwml" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:34.526476538Z I0223 13:01:34.524099 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-j5hpl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:35.710329430Z I0223 13:01:35.701288 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-bckd6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:35.912049913Z I0223 13:01:35.910800 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-6dcf85cb46-cmf75" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:01:37.578318482Z I0223 13:01:37.577712 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-6dcf85cb46-cmf75" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:38.658235126Z I0223 13:01:38.658163 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7cc4b4775-6vdrk" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:01:38.673162904Z I0223 13:01:38.673027 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-859cf5fcc7-lmnw2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:01:40.590052943Z I0223 13:01:40.589996 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-859cf5fcc7-lmnw2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:01:40.599724684Z I0223 13:01:40.599699 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7cc4b4775-6vdrk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:43.162468812Z I0223 13:01:43.161843 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-5ddfd84bb7-vhg7p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:43.192643288Z I0223 13:01:43.192345 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-859cf5fcc7-lmnw2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:52.556764670Z I0223 13:01:52.556696 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-75bpf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:52.727357359Z I0223 13:01:52.725487 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-5fngq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:01:53.022054652Z I0223 13:01:53.021223 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-rcn5b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:53.439643312Z I0223 13:01:53.438789 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-bq97v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:01:53.624009564Z I0223 13:01:53.623948 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7b65dc9fcb-v92vx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-23T13:02:01.563452350Z I0223 13:02:01.561979 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-8457dbd4bb-hmgzl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:02:01.652273467Z I0223 13:02:01.652182 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-bc7b979c6-vb276" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:02:02.984997757Z I0223 13:02:02.984947 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-8457dbd4bb-hmgzl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:02:02.993799316Z I0223 13:02:02.993712 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-bc7b979c6-vb276" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:05.205353525Z I0223 13:02:05.202803 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-8457dbd4bb-hmgzl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:08.097470982Z I0223 13:02:08.095461 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-57476485-j4p78" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:18.624143692Z I0223 13:02:18.624061 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:02:18.647296194Z I0223 13:02:18.646751 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-64ccc6b554-znpw2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-23T13:02:20.216909873Z I0223 13:02:20.216776 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:20.219160869Z I0223 13:02:20.219059 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-64ccc6b554-znpw2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:21.722726742Z I0223 13:02:21.721551 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-686847ff5f-rvz4w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:24.933697222Z I0223 13:02:24.931655 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-798b897698-j6dvg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:27.879071610Z I0223 13:02:27.878963 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-6968c58f46-gss4v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:28.699890589Z I0223 13:02:28.698059 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-65c5c48b9b-ldgbf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:29.864340343Z I0223 13:02:29.864044 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:30.763268564Z I0223 13:02:30.763194 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6-6b92p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:31.193614211Z I0223 13:02:31.192677 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-59b498fcfb-xltpx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:31.290360081Z I0223 13:02:31.289886 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-mjhwm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:31.415525148Z I0223 13:02:31.415427 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49-ck859" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:31.687602674Z I0223 13:02:31.687525 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-7f8c75f984-82h6s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-23T13:02:38.328914677Z E0223 13:02:38.328807 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-02-23T13:02:43.329121865Z E0223 13:02:43.328963 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-23T13:02:43.329121865Z I0223 13:02:43.329019 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-02-23T13:02:48.329741396Z E0223 13:02:48.329584 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:02:48.329741396Z E0223 13:02:48.329689 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515147050273023010 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"f6df0d0f-2538-4368-8abb-d08349f326f0","resourceVersion":"9614","creationTimestamp":"2026-02-23T13:00:03Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"56c3cb71c9851003c8de7e7c5db4b87e","kubernetes.io/config.mirror":"56c3cb71c9851003c8de7e7c5db4b87e","kubernetes.io/config.seen":"2026-02-23T12:58:32.863485929Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"a649b105-b588-45b2-81ba-99a4648aee7c","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T13:01:06Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-02-23T13:02:48Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-23T12:58:43Z","finishedAt":"2026-02-23T13:02:48Z","containerID":"cri-o://177a00edcfd919e7d221798cd7875143318357f73a98d1f96f1e3d8cf020354d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","containerID":"cri-o://fd8a73b94af97a6ee5fd332de6ff901ee87339c2669fee29463cd1d6a2935792","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000011473315147050273034225 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-23T12:59:09.380505083Z E0223 12:59:09.380441 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-23T12:59:33.411099369Z W0223 12:59:33.410962 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-23T12:59:33.411099369Z E0223 12:59:33.411020 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-23T12:59:47.923815560Z E0223 12:59:47.923717 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: f860fe13-a441-476f-a660-a24eee07a69f, UID in object meta: , falling back to slow path 2026-02-23T12:59:54.403564783Z I0223 12:59:54.403438 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-02-23T12:59:54.992516535Z I0223 12:59:54.992358 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-02-23T12:59:54.992652539Z I0223 12:59:54.992596 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-02-23T12:59:54.993366010Z I0223 12:59:54.993307 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-02-23T12:59:54.993388801Z I0223 12:59:54.993374 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-02-23T12:59:54.993494564Z I0223 12:59:54.993444 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-02-23T12:59:55.013806193Z I0223 12:59:55.013728 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T12:59:55.031863924Z I0223 12:59:55.031769 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T12:59:55.046607515Z I0223 12:59:55.046532 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T12:59:55.060168092Z I0223 12:59:55.060120 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T12:59:55.094117749Z I0223 12:59:55.094020 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-23T12:59:55.303324685Z I0223 12:59:55.302679 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-02-23T12:59:55.509973636Z I0223 12:59:55.509881 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-02-23T13:00:01.119288094Z I0223 13:00:01.119166 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-02-23T13:00:02.558203176Z W0223 13:00:02.558077 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-23T13:00:02.558203176Z E0223 13:00:02.558162 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-23T13:00:09.850444035Z I0223 13:00:09.850340 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-02-23T13:00:10.320509286Z I0223 13:00:10.320431 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-02-23T13:00:13.528303906Z I0223 13:00:13.528119 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-02-23T13:00:13.900480164Z I0223 13:00:13.900355 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-02-23T13:00:14.306398394Z I0223 13:00:14.306293 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-02-23T13:00:25.102329758Z I0223 13:00:25.102266 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks], removed: [] 2026-02-23T13:00:25.102396930Z I0223 13:00:25.102386 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-02-23T13:00:25.102454941Z I0223 13:00:25.102431 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-02-23T13:00:25.102466342Z I0223 13:00:25.102457 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-02-23T13:00:25.102505503Z I0223 13:00:25.102484 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-02-23T13:00:25.102519283Z I0223 13:00:25.102513 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-02-23T13:00:25.104090570Z I0223 13:00:25.104058 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:00:25.104234505Z I0223 13:00:25.104201 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:00:25.104541334Z I0223 13:00:25.104503 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:00:25.104541334Z I0223 13:00:25.104515 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:00:25.104589415Z I0223 13:00:25.104551 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:00:25.203563950Z I0223 13:00:25.203509 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-23T13:00:58.985181453Z W0223 13:00:58.985053 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-23T13:00:58.985181453Z E0223 13:00:58.985135 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-23T13:01:18.547647432Z I0223 13:01:18.547468 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-02-23T13:01:18.896312574Z I0223 13:01:18.895637 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-02-23T13:01:19.046897083Z I0223 13:01:19.044600 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-02-23T13:01:19.705236607Z I0223 13:01:19.704165 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-02-23T13:01:22.575687139Z I0223 13:01:22.574683 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-02-23T13:01:22.600711240Z I0223 13:01:22.599923 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-02-23T13:01:23.925161161Z I0223 13:01:23.923380 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-02-23T13:01:25.227547511Z I0223 13:01:25.227482 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-02-23T13:01:25.227858250Z I0223 13:01:25.227831 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-02-23T13:01:25.230644284Z I0223 13:01:25.230568 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:01:25.329181111Z I0223 13:01:25.329085 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-23T13:01:25.739470042Z I0223 13:01:25.739396 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-02-23T13:01:26.217745604Z I0223 13:01:26.217628 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T13:01:28.961604196Z I0223 13:01:28.950671 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-02-23T13:01:36.525277704Z I0223 13:01:36.525146 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-02-23T13:01:37.951652455Z W0223 13:01:37.951556 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-23T13:01:37.951652455Z E0223 13:01:37.951634 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-23T13:01:52.427884264Z I0223 13:01:52.427155 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-pqcf4" has been approved 2026-02-23T13:01:52.453754130Z I0223 13:01:52.453684 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-446tt" has been approved 2026-02-23T13:01:52.829130163Z I0223 13:01:52.829026 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-02-23T13:01:53.511908081Z I0223 13:01:53.511819 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-02-23T13:02:02.353177434Z I0223 13:02:02.351591 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-02-23T13:02:02.366621900Z I0223 13:02:02.366566 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-02-23T13:02:02.900957941Z I0223 13:02:02.900896 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-02-23T13:02:21.457310803Z I0223 13:02:21.454921 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-02-23T13:02:25.354287453Z I0223 13:02:25.353525 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:02:25.354287453Z E0223 13:02:25.353675 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:02:25.831080388Z I0223 13:02:25.830941 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-02-23T13:02:27.860381669Z I0223 13:02:27.860225 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-02-23T13:02:28.517952690Z I0223 13:02:28.515420 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-02-23T13:02:29.086937171Z I0223 13:02:29.085921 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-02-23T13:02:29.731320524Z I0223 13:02:29.731257 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-02-23T13:02:37.656615602Z W0223 13:02:37.656521 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-23T13:02:37.656615602Z E0223 13:02:37.656579 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-23T13:02:55.366210938Z I0223 13:02:55.366062 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:02:55.366210938Z E0223 13:02:55.366194 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:03:19.358991989Z W0223 13:03:19.358871 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-23T13:03:19.358991989Z E0223 13:03:19.358947 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-23T13:03:21.953296633Z E0223 13:03:21.953170 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-23T13:03:25.379825618Z I0223 13:03:25.379694 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:03:25.379885090Z E0223 13:03:25.379821 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:03:55.395191031Z I0223 13:03:55.395008 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:03:55.395319015Z E0223 13:03:55.395182 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:04:12.078383328Z W0223 13:04:12.078222 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-23T13:04:12.078383328Z E0223 13:04:12.078349 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-23T13:04:21.955530315Z E0223 13:04:21.955453 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-02-23T13:04:25.407414342Z I0223 13:04:25.407177 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:04:25.407414342Z E0223 13:04:25.407307 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:04:46.938760332Z W0223 13:04:46.938697 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-23T13:04:46.938910356Z E0223 13:04:46.938890 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-23T13:04:55.420492700Z I0223 13:04:55.420331 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:04:55.420574852Z E0223 13:04:55.420490 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:05:23.996181510Z W0223 13:05:23.996047 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-23T13:05:23.996276513Z E0223 13:05:23.996187 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-23T13:05:25.430028331Z I0223 13:05:25.429893 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:05:25.430028331Z E0223 13:05:25.430011 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-23T13:05:52.743860634Z I0223 13:05:52.742839 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-02-23T13:05:55.291858415Z W0223 13:05:55.291770 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-23T13:05:55.291858415Z E0223 13:05:55.291838 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-23T13:05:55.442314892Z I0223 13:05:55.441401 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-23T13:05:55.442314892Z E0223 13:05:55.441488 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000010450315147050273033577 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-23T13:05:53.647756759Z I0223 13:05:53.647739 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[helm.openshift.io/v1beta1/HelmChartRepository, namespace: , name: openshift-helm-charts, uid: b65863ec-bfbd-4533-9735-835a78978853]" virtual=false 2026-02-23T13:05:53.650171350Z I0223 13:05:53.650102 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:cloud-controller-manager, uid: 72ed61e5-6b30-47de-94dc-a0f395aa3cdd]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.650171350Z I0223 13:05:53.650155 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: multus.openshift.io, uid: 8137cb2f-0354-4c7d-b16e-6735865d3263]" virtual=false 2026-02-23T13:05:53.657341982Z I0223 13:05:53.657213 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:cluster-kube-scheduler-operator, uid: ea412281-5968-450b-9827-a0afb2c04c88]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.657341982Z I0223 13:05:53.657297 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: network-node-identity.openshift.io, uid: 0875e001-63b8-486c-a55d-2d4bedca6746]" virtual=false 2026-02-23T13:05:53.659549148Z I0223 13:05:53.659452 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:etcd-operator, uid: 94467d90-28e3-4b53-b214-1032d55ba21d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.659549148Z I0223 13:05:53.659509 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: performance-addon-operator, uid: 2192adc2-2074-4303-b781-f105a3de3f71]" virtual=false 2026-02-23T13:05:53.663263052Z I0223 13:05:53.663142 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:kube-apiserver-operator, uid: f845f5da-2bdf-485a-bb1d-aefe99d68b9e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.663263052Z I0223 13:05:53.663202 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/InsightsOperator, namespace: , name: cluster, uid: 308478a8-d8a1-4819-9466-9535889edf46]" virtual=false 2026-02-23T13:05:53.670068825Z I0223 13:05:53.670007 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:kube-controller-manager-operator, uid: b326184e-7be6-47b9-a0d7-fb0b57738588]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.670068825Z I0223 13:05:53.670047 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/OAuth, namespace: , name: cluster, uid: 8e27be16-1461-45df-9c2e-c693f27079e7]" virtual=false 2026-02-23T13:05:53.670384843Z I0223 13:05:53.670328 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:kube-storage-version-migrator-operator, uid: d5c52d03-ef03-4131-b838-16c02790536e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.670384843Z I0223 13:05:53.670365 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Storage, namespace: , name: cluster, uid: ee704674-be9e-4e50-8391-39416310403c]" virtual=false 2026-02-23T13:05:53.673366069Z I0223 13:05:53.673311 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:openshift-apiserver-operator, uid: 59ff035b-6d81-4ed1-884b-f6654ca541e0]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.673366069Z I0223 13:05:53.673343 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/OpenShiftControllerManager, namespace: , name: cluster, uid: d420a40f-8d91-46ff-8e74-a7433f3b8e06]" virtual=false 2026-02-23T13:05:53.676439827Z I0223 13:05:53.676383 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:openshift-config-operator, uid: 02387ec6-e2df-42df-ad91-89650a56fb05]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.676439827Z I0223 13:05:53.676419 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/Console, namespace: , name: cluster, uid: fcfb75ec-dac5-40a8-bcee-28f6f79dcda8]" virtual=false 2026-02-23T13:05:53.684080430Z I0223 13:05:53.684024 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:openshift-controller-manager-operator, uid: 77904fd4-9393-4ea1-997f-67f3c5987dcc]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.684080430Z I0223 13:05:53.684061 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/Image, namespace: , name: cluster, uid: ea08b010-d3b5-4cd6-847b-b99bfb008c44]" virtual=false 2026-02-23T13:05:53.699973754Z I0223 13:05:53.699882 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:service-ca-operator, uid: 6e5115ee-876c-4067-b172-7eeaa826304e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.699973754Z I0223 13:05:53.699947 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/Build, namespace: , name: cluster, uid: 3803c4a5-c02d-41e2-945b-52f25cf58a8f]" virtual=false 2026-02-23T13:05:53.720445633Z I0223 13:05:53.720332 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:scc:restricted-v2, uid: 18d1ca3e-f553-4573-bb2c-edb1a7b0e6e2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.720445633Z I0223 13:05:53.720401 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeControllerManager, namespace: , name: cluster, uid: 72a4c216-e2d0-4b24-b86b-366fcf4a650a]" virtual=false 2026-02-23T13:05:53.748521086Z I0223 13:05:53.748194 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[migration.k8s.io/v1alpha1/StorageVersionMigration, namespace: , name: machineconfiguration-controllerconfig-storage-version-migration, uid: e7ec29c8-2da3-4bdf-8e6f-6f9e8e514166]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.748521086Z I0223 13:05:53.748496 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeScheduler, namespace: , name: cluster, uid: c8999061-72b8-45f0-a149-c65e13637ae9]" virtual=false 2026-02-23T13:05:53.753505382Z I0223 13:05:53.753425 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[migration.k8s.io/v1alpha1/StorageVersionMigration, namespace: , name: machineconfiguration-machineconfigpool-storage-version-migration, uid: 6741067b-14f6-4c8c-8489-efe04e179bcf]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.753537693Z I0223 13:05:53.753498 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeAPIServer, namespace: , name: cluster, uid: 96c59361-57c5-47ab-86cd-20090f83893f]" virtual=false 2026-02-23T13:05:53.756517849Z I0223 13:05:53.756460 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/APIServer, namespace: , name: cluster, uid: 316a6eb5-512f-4cd0-8605-e97b84a96a58]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.756517849Z I0223 13:05:53.756503 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/OperatorHub, namespace: , name: cluster, uid: b312f311-3454-4d74-9c7e-b798df8d34e8]" virtual=false 2026-02-23T13:05:53.760118650Z I0223 13:05:53.760054 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Node, namespace: , name: cluster, uid: 9506845c-4d76-41b7-8cab-bdb11d7f4587]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.760118650Z I0223 13:05:53.760099 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Config, namespace: , name: cluster, uid: 20ce7e2c-ed05-4bcf-bbfe-d3a320f13391]" virtual=false 2026-02-23T13:05:53.763096526Z I0223 13:05:53.763030 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/OLM, namespace: , name: cluster, uid: dd30092b-acf4-48ae-97a7-2e55df19a6f4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.763113676Z I0223 13:05:53.763083 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/CSISnapshotController, namespace: , name: cluster, uid: 38bc168b-7caf-40e1-8d57-e48f52256a97]" virtual=false 2026-02-23T13:05:53.770649867Z I0223 13:05:53.770578 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[scheduling.k8s.io/v1/PriorityClass, namespace: , name: openshift-user-critical, uid: 71cac62c-31dc-40d1-bd47-8671a709dd1b]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.770649867Z I0223 13:05:53.770633 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operators.coreos.com/v1/OLMConfig, namespace: , name: cluster, uid: e5b8e2e6-daa5-416b-80c5-7dc0b2d3d2f2]" virtual=false 2026-02-23T13:05:53.772594016Z I0223 13:05:53.772526 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/ServiceCA, namespace: , name: cluster, uid: 59a135d5-1a59-435f-b276-3646fd0135d9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.772613537Z I0223 13:05:53.772586 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/Authentication, namespace: , name: cluster, uid: 6f90a703-3110-4b8d-b1ec-00a7105082b2]" virtual=false 2026-02-23T13:05:53.776795613Z I0223 13:05:53.776734 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Project, namespace: , name: cluster, uid: 8a5787ce-d5db-4136-9788-6f97ad406b5f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.776823754Z I0223 13:05:53.776784 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[flowcontrol.apiserver.k8s.io/v1/FlowSchema, namespace: , name: openshift-ovn-kubernetes, uid: a32060f8-d75f-4f12-a267-d4ebf2edbd96]" virtual=false 2026-02-23T13:05:53.779881761Z I0223 13:05:53.779818 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[helm.openshift.io/v1beta1/HelmChartRepository, namespace: , name: openshift-helm-charts, uid: b65863ec-bfbd-4533-9735-835a78978853]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.779881761Z I0223 13:05:53.779850 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-apiserver, name: revision-status-1, uid: 0ccf8ede-bac3-4788-a305-42f17af5af17]" virtual=false 2026-02-23T13:05:53.785570056Z I0223 13:05:53.785483 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: multus.openshift.io, uid: 8137cb2f-0354-4c7d-b16e-6735865d3263]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"895c304b-4f58-4ee5-88db-48f2e2f1d40c","controller":true,"blockOwnerDeletion":true}] 2026-02-23T13:05:53.785646788Z I0223 13:05:53.785554 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: fbd25529-dec0-4ea8-a2f4-697a288a2dc6]" virtual=false 2026-02-23T13:05:53.790467460Z I0223 13:05:53.790364 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: network-node-identity.openshift.io, uid: 0875e001-63b8-486c-a55d-2d4bedca6746]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"895c304b-4f58-4ee5-88db-48f2e2f1d40c","controller":true,"blockOwnerDeletion":true}] 2026-02-23T13:05:53.796838482Z I0223 13:05:53.796716 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: performance-addon-operator, uid: 2192adc2-2074-4303-b781-f105a3de3f71]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}] 2026-02-23T13:05:53.798703959Z I0223 13:05:53.798656 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/InsightsOperator, namespace: , name: cluster, uid: 308478a8-d8a1-4819-9466-9535889edf46]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.800272719Z I0223 13:05:53.800171 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/OAuth, namespace: , name: cluster, uid: 8e27be16-1461-45df-9c2e-c693f27079e7]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.804157437Z I0223 13:05:53.804074 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Storage, namespace: , name: cluster, uid: ee704674-be9e-4e50-8391-39416310403c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.806283601Z I0223 13:05:53.806201 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/OpenShiftControllerManager, namespace: , name: cluster, uid: d420a40f-8d91-46ff-8e74-a7433f3b8e06]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.810202691Z I0223 13:05:53.810133 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Console, namespace: , name: cluster, uid: fcfb75ec-dac5-40a8-bcee-28f6f79dcda8]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.818512372Z I0223 13:05:53.818440 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Image, namespace: , name: cluster, uid: ea08b010-d3b5-4cd6-847b-b99bfb008c44]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.832902397Z I0223 13:05:53.832842 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Build, namespace: , name: cluster, uid: 3803c4a5-c02d-41e2-945b-52f25cf58a8f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.846546733Z I0223 13:05:53.846473 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-apiserver, name: revision-status-1, uid: 0ccf8ede-bac3-4788-a305-42f17af5af17]" 2026-02-23T13:05:53.849540599Z I0223 13:05:53.849488 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: fbd25529-dec0-4ea8-a2f4-697a288a2dc6]" 2026-02-23T13:05:53.852785801Z I0223 13:05:53.852727 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeControllerManager, namespace: , name: cluster, uid: 72a4c216-e2d0-4b24-b86b-366fcf4a650a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.856877815Z I0223 13:05:53.856820 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeScheduler, namespace: , name: cluster, uid: c8999061-72b8-45f0-a149-c65e13637ae9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.859902262Z I0223 13:05:53.859838 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeAPIServer, namespace: , name: cluster, uid: 96c59361-57c5-47ab-86cd-20090f83893f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.862960959Z I0223 13:05:53.862916 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/OperatorHub, namespace: , name: cluster, uid: b312f311-3454-4d74-9c7e-b798df8d34e8]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.866710305Z I0223 13:05:53.866666 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Config, namespace: , name: cluster, uid: 20ce7e2c-ed05-4bcf-bbfe-d3a320f13391]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.870221554Z I0223 13:05:53.870152 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/CSISnapshotController, namespace: , name: cluster, uid: 38bc168b-7caf-40e1-8d57-e48f52256a97]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.879639783Z I0223 13:05:53.879577 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operators.coreos.com/v1/OLMConfig, namespace: , name: cluster, uid: e5b8e2e6-daa5-416b-80c5-7dc0b2d3d2f2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.879639783Z I0223 13:05:53.879576 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Authentication, namespace: , name: cluster, uid: 6f90a703-3110-4b8d-b1ec-00a7105082b2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}] 2026-02-23T13:05:53.880557536Z I0223 13:05:53.880478 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[flowcontrol.apiserver.k8s.io/v1/FlowSchema, namespace: , name: openshift-ovn-kubernetes, uid: a32060f8-d75f-4f12-a267-d4ebf2edbd96]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"895c304b-4f58-4ee5-88db-48f2e2f1d40c","controller":true,"blockOwnerDeletion":true}] 2026-02-23T13:05:55.074072329Z I0223 13:05:55.073931 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-api/machine-api-operator-5c7cf458b4" need=1 creating=1 2026-02-23T13:05:55.078461210Z I0223 13:05:55.078355 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" need=1 creating=1 2026-02-23T13:05:55.091608364Z I0223 13:05:55.091478 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-api/machine-api-operator" err="Operation cannot be fulfilled on deployments.apps \"machine-api-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:55.095267476Z I0223 13:05:55.095189 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:55.101683189Z I0223 13:05:55.101599 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" need=1 creating=1 2026-02-23T13:05:55.135652911Z I0223 13:05:55.135576 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:55.135714833Z I0223 13:05:55.135667 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:55.167820757Z I0223 13:05:55.167702 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:55.209811293Z I0223 13:05:55.209742 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:56.230529350Z I0223 13:05:56.230422 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="64.361µs" 2026-02-23T13:05:56.739046983Z I0223 13:05:56.738950 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="1.637370514s" 2026-02-23T13:05:56.760947499Z I0223 13:05:56.759304 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="1.685380442s" 2026-02-23T13:05:56.763615196Z I0223 13:05:56.761074 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="1.682746236s" 2026-02-23T13:05:56.769449264Z I0223 13:05:56.769332 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="4.717363832s" 2026-02-23T13:05:56.785687986Z I0223 13:05:56.785578 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="26.140193ms" 2026-02-23T13:05:56.785754678Z I0223 13:05:56.785732 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="87.602µs" 2026-02-23T13:05:56.785885671Z I0223 13:05:56.785828 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="24.669606ms" 2026-02-23T13:05:56.785951103Z I0223 13:05:56.785912 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="53.301µs" 2026-02-23T13:05:56.786169919Z I0223 13:05:56.786112 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="16.720014ms" 2026-02-23T13:05:56.786227950Z I0223 13:05:56.786191 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="44.831µs" 2026-02-23T13:05:56.791442412Z I0223 13:05:56.790176 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="51.144778ms" 2026-02-23T13:05:56.801686202Z I0223 13:05:56.800964 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="31.311µs" 2026-02-23T13:05:56.803411656Z I0223 13:05:56.803098 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="44.381µs" 2026-02-23T13:05:56.821650359Z I0223 13:05:56.821564 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="31.325694ms" 2026-02-23T13:05:56.821709060Z I0223 13:05:56.821651 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="47.421µs" 2026-02-23T13:05:56.879377264Z I0223 13:05:56.879295 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="80.852µs" 2026-02-23T13:05:56.916540096Z I0223 13:05:56.916477 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="51.652µs" 2026-02-23T13:05:56.936156694Z I0223 13:05:56.936070 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="62.812µs" 2026-02-23T13:05:57.060293714Z I0223 13:05:57.060190 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="11.330557ms" 2026-02-23T13:05:57.060357386Z I0223 13:05:57.060288 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="55.502µs" 2026-02-23T13:05:57.693530421Z I0223 13:05:57.693276 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="63.041µs" 2026-02-23T13:05:57.810491079Z I0223 13:05:57.809996 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="55.592µs" 2026-02-23T13:05:58.119708405Z I0223 13:05:58.118014 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="13.433071ms" 2026-02-23T13:05:58.119708405Z I0223 13:05:58.118157 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="63.701µs" 2026-02-23T13:05:58.152406634Z I0223 13:05:58.151212 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="52.692µs" 2026-02-23T13:05:58.358693928Z I0223 13:05:58.358619 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="12.113867ms" 2026-02-23T13:05:58.358786111Z I0223 13:05:58.358755 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-548fc9dc5" duration="76.962µs" kube-controller-manager_previous.log0000640000000000000000000003173215147050273033774 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-23T13:02:47.995877701Z I0223 13:02:47.995872 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-02-23T13:02:47.995884941Z I0223 13:02:47.995879 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-02-23T13:02:47.995891901Z I0223 13:02:47.995884 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-02-23T13:02:47.995898871Z I0223 13:02:47.995891 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-02-23T13:02:47.995906091Z I0223 13:02:47.995897 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-02-23T13:02:47.995913272Z I0223 13:02:47.995903 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-02-23T13:02:47.995913272Z I0223 13:02:47.995908 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-02-23T13:02:47.995920522Z I0223 13:02:47.995913 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-02-23T13:02:47.995927702Z I0223 13:02:47.995918 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-02-23T13:02:47.995927702Z I0223 13:02:47.995924 1 flags.go:64] FLAG: --secure-port="10257" 2026-02-23T13:02:47.995934912Z I0223 13:02:47.995928 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-02-23T13:02:47.995942452Z I0223 13:02:47.995934 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-02-23T13:02:47.995942452Z I0223 13:02:47.995939 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-02-23T13:02:47.995949683Z I0223 13:02:47.995944 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-02-23T13:02:47.995956933Z I0223 13:02:47.995948 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-23T13:02:47.995964103Z I0223 13:02:47.995953 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-23T13:02:47.995964103Z I0223 13:02:47.995959 1 flags.go:64] FLAG: --tls-min-version="" 2026-02-23T13:02:47.995971313Z I0223 13:02:47.995963 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-23T13:02:47.995978474Z I0223 13:02:47.995967 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-23T13:02:47.995978474Z I0223 13:02:47.995974 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-02-23T13:02:47.995985724Z I0223 13:02:47.995980 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-02-23T13:02:47.995992644Z I0223 13:02:47.995984 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-02-23T13:02:47.995999874Z I0223 13:02:47.995989 1 flags.go:64] FLAG: --v="2" 2026-02-23T13:02:47.996007064Z I0223 13:02:47.995995 1 flags.go:64] FLAG: --version="false" 2026-02-23T13:02:47.996007064Z I0223 13:02:47.996002 1 flags.go:64] FLAG: --vmodule="" 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996207 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996219 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996224 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996229 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996233 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996237 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996263 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-02-23T13:02:47.996275952Z W0223 13:02:47.996269 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996274 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996280 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996286 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996292 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996297 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996302 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996306 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996310 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996314 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-02-23T13:02:47.996322014Z W0223 13:02:47.996318 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-02-23T13:02:47.996344054Z W0223 13:02:47.996322 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-02-23T13:02:47.996344054Z W0223 13:02:47.996326 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-02-23T13:02:47.996344054Z W0223 13:02:47.996330 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-02-23T13:02:47.996344054Z W0223 13:02:47.996334 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-02-23T13:02:47.996344054Z W0223 13:02:47.996339 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-02-23T13:02:47.996362855Z W0223 13:02:47.996343 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-02-23T13:02:47.996362855Z W0223 13:02:47.996347 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-02-23T13:02:47.996362855Z W0223 13:02:47.996351 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-02-23T13:02:47.996362855Z W0223 13:02:47.996355 1 feature_gate.go:330] unrecognized feature gate: Example 2026-02-23T13:02:47.996362855Z W0223 13:02:47.996359 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-02-23T13:02:47.996380845Z W0223 13:02:47.996363 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-02-23T13:02:47.996380845Z W0223 13:02:47.996367 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-02-23T13:02:47.996380845Z W0223 13:02:47.996371 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-02-23T13:02:47.996380845Z W0223 13:02:47.996377 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-02-23T13:02:47.996405646Z W0223 13:02:47.996381 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-02-23T13:02:47.996405646Z W0223 13:02:47.996386 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-02-23T13:02:47.996405646Z W0223 13:02:47.996389 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-02-23T13:02:47.996405646Z W0223 13:02:47.996393 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-02-23T13:02:47.996405646Z W0223 13:02:47.996398 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-02-23T13:02:47.996405646Z W0223 13:02:47.996401 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-02-23T13:02:47.996424647Z W0223 13:02:47.996407 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-02-23T13:02:47.996424647Z W0223 13:02:47.996411 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-02-23T13:02:47.996424647Z W0223 13:02:47.996416 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-02-23T13:02:47.996441867Z W0223 13:02:47.996421 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-02-23T13:02:47.996441867Z W0223 13:02:47.996426 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-02-23T13:02:47.996441867Z W0223 13:02:47.996430 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-02-23T13:02:47.996441867Z W0223 13:02:47.996435 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-02-23T13:02:47.996459388Z W0223 13:02:47.996439 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-02-23T13:02:47.996459388Z W0223 13:02:47.996444 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-02-23T13:02:47.996459388Z W0223 13:02:47.996448 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-02-23T13:02:47.996459388Z W0223 13:02:47.996452 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-02-23T13:02:47.996459388Z W0223 13:02:47.996455 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-02-23T13:02:47.996477518Z W0223 13:02:47.996459 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-02-23T13:02:47.996477518Z W0223 13:02:47.996464 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-02-23T13:02:47.996477518Z W0223 13:02:47.996468 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-02-23T13:02:47.996477518Z W0223 13:02:47.996472 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-02-23T13:02:47.996495059Z W0223 13:02:47.996475 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-02-23T13:02:47.996495059Z W0223 13:02:47.996480 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-02-23T13:02:47.996495059Z W0223 13:02:47.996486 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-02-23T13:02:47.996495059Z W0223 13:02:47.996491 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-02-23T13:02:47.996512489Z W0223 13:02:47.996497 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-02-23T13:02:47.996512489Z W0223 13:02:47.996503 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-02-23T13:02:47.996512489Z W0223 13:02:47.996507 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-02-23T13:02:47.996536690Z W0223 13:02:47.996511 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-02-23T13:02:47.996536690Z W0223 13:02:47.996515 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-02-23T13:02:47.996536690Z W0223 13:02:47.996520 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-02-23T13:02:47.996536690Z W0223 13:02:47.996523 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-02-23T13:02:47.996536690Z W0223 13:02:47.996527 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-02-23T13:02:47.996536690Z W0223 13:02:47.996531 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-02-23T13:02:47.996555451Z W0223 13:02:47.996547 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-02-23T13:02:47.996555451Z W0223 13:02:47.996552 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-02-23T13:02:47.996571341Z W0223 13:02:47.996555 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-02-23T13:02:47.996571341Z W0223 13:02:47.996560 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-02-23T13:02:47.996571341Z W0223 13:02:47.996564 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-02-23T13:02:48.198862420Z I0223 13:02:48.198757 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-02-23T13:02:48.204876577Z I0223 13:02:48.204784 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-02-23T13:03:48.429836042Z E0223 13:03:48.429674 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715147050273024633 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"cc724954-8885-48bc-96dd-eb85b33713e6","resourceVersion":"9622","creationTimestamp":"2026-02-23T13:00:01Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c9ad9373c007a4fcd25e70622bdc8deb","kubernetes.io/config.mirror":"c9ad9373c007a4fcd25e70622bdc8deb","kubernetes.io/config.seen":"2026-02-23T12:58:32.863484278Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"a649b105-b588-45b2-81ba-99a4648aee7c","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T13:01:06Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-23T12:58:47Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","containerID":"cri-o://321eaf326ad8a489a13ada6c53cf34c2c99e6344cfe3f0727f5eef006f9c7e8e","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-23T13:02:47Z","finishedAt":"2026-02-23T13:03:48Z","containerID":"cri-o://611039cddaab573cdf7f17e37d453d213099869d69ffbabcba17a4b655a9aee4"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","containerID":"cri-o://dfd86a94ccff1eeb13e1ddaabeeeb38c3d4bc54e7d5689b425d76ab48acf7562","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000013310415147050273044462 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-7bcfbc574b-jpf5n2026-02-23T13:04:47.864544477Z W0223 13:04:47.864401 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-23T13:04:47.864544477Z E0223 13:04:47.864481 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-23T13:04:47.870308815Z I0223 13:04:47.870194 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StartingNewRevision' new revision 3 triggered by "required configmap/serviceaccount-ca has changed" 2026-02-23T13:05:03.234715327Z E0223 13:05:03.234561 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-controller-manager-operator-lock) 2026-02-23T13:05:06.259317453Z E0223 13:05:06.259160 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request" 2026-02-23T13:05:07.248868478Z E0223 13:05:07.248740 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa), \"manifests/installer-cluster-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:openshift-kube-controller-manager-installer), unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": Timeout: request did not complete within requested timeout - context deadline exceeded]" 2026-02-23T13:05:21.874095258Z E0223 13:05:21.874003 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator.1896e1c7565f85b5 openshift-kube-controller-manager-operator 9412 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator,UID:3b3b72a4-dcc1-4645-9158-07609f55916c,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:StartingNewRevision,Message:new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\",Source:EventSource{Component:kube-controller-manager-operator-revisioncontroller,Host:,},FirstTimestamp:2026-02-23 13:02:29 +0000 UTC,LastTimestamp:2026-02-23 13:04:47.869919493 +0000 UTC m=+139.201147991,Count:3,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator-revisioncontroller,ReportingInstance:,}" 2026-02-23T13:05:25.556308645Z I0223 13:05:25.556209 1 helpers.go:184] lister was stale at resourceVersion=8595, live get showed resourceVersion=9576 2026-02-23T13:05:25.557735891Z E0223 13:05:25.557685 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-23T13:05:25.561784714Z I0223 13:05:25.561701 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StartingNewRevision' new revision 3 triggered by "required configmap/serviceaccount-ca has changed" 2026-02-23T13:05:25.592980545Z E0223 13:05:25.592807 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-02-23T13:05:25.609350461Z I0223 13:05:25.609095 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:25.609591787Z I0223 13:05:25.609535 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:25.612643184Z I0223 13:05:25.612583 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:25.616955984Z I0223 13:05:25.616865 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:32.047173303Z E0223 13:05:32.047072 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-02-23T13:05:33.407922019Z I0223 13:05:33.407749 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-3 -n openshift-kube-controller-manager because it was missing 2026-02-23T13:05:33.416973989Z I0223 13:05:33.416898 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 3 triggered by "required configmap/serviceaccount-ca has changed" 2026-02-23T13:05:33.451370781Z I0223 13:05:33.449921 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:33.455347672Z W0223 13:05:33.453991 1 dynamic_operator_client.go:355] .status.conditions["RevisionControllerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:33.455347672Z I0223 13:05:33.454010 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:33.482398269Z I0223 13:05:33.482294 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:34.440487357Z I0223 13:05:34.440337 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:36.820536236Z I0223 13:05:36.820417 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\nTargetConfigControllerDegraded: \"configmap/recycler-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:36.821146821Z I0223 13:05:36.821080 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready" 2026-02-23T13:05:36.834741826Z E0223 13:05:36.834635 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:36.842607776Z I0223 13:05:36.842517 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\nTargetConfigControllerDegraded: \"configmap/recycler-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:36.854079767Z E0223 13:05:36.854011 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:36.866770619Z I0223 13:05:36.866649 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\nTargetConfigControllerDegraded: \"configmap/recycler-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:36.880112167Z E0223 13:05:36.879497 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-23T13:05:36.881266797Z I0223 13:05:36.881198 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\nTargetConfigControllerDegraded: \"configmap/recycler-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:36.893047316Z I0223 13:05:36.892955 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready" to "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\nTargetConfigControllerDegraded: \"configmap/recycler-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)" 2026-02-23T13:05:37.840290779Z I0223 13:05:37.840111 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:37.840777592Z I0223 13:05:37.840688 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:37.858059830Z I0223 13:05:37.857940 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\nTargetConfigControllerDegraded: \"configmap/recycler-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)" to "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-02-23T13:05:40.285875780Z W0223 13:05:40.285804 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:05:40.285980633Z W0223 13:05:40.285954 1 dynamic_operator_client.go:355] .status.conditions["StaticPodsDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:40.334882233Z I0223 13:05:40.334806 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:40.335088719Z I0223 13:05:40.335054 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"NodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:40.347111684Z I0223 13:05:40.345684 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" to "NodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-02-23T13:05:40.603437038Z I0223 13:05:40.603365 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-23T13:05:40.794774192Z I0223 13:05:40.794047 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:40.818222057Z E0223 13:05:40.817277 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:40.819605042Z I0223 13:05:40.819570 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:40.822143797Z I0223 13:05:40.822100 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:40.838952953Z I0223 13:05:40.838112 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" to "NodeControllerDegraded: All master nodes are ready" 2026-02-23T13:05:41.390397185Z I0223 13:05:41.390342 1 request.go:700] Waited for 1.05347509s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa 2026-02-23T13:05:41.799391692Z I0223 13:05:41.799314 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-23T13:05:41.799391692Z NodeName: (string) (len=8) "master-0", 2026-02-23T13:05:41.799391692Z CurrentRevision: (int32) 0, 2026-02-23T13:05:41.799391692Z TargetRevision: (int32) 3, 2026-02-23T13:05:41.799391692Z LastFailedRevision: (int32) 0, 2026-02-23T13:05:41.799391692Z LastFailedTime: (*v1.Time)(), 2026-02-23T13:05:41.799391692Z LastFailedReason: (string) "", 2026-02-23T13:05:41.799391692Z LastFailedCount: (int) 0, 2026-02-23T13:05:41.799391692Z LastFallbackCount: (int) 0, 2026-02-23T13:05:41.799391692Z LastFailedRevisionErrors: ([]string) 2026-02-23T13:05:41.799391692Z } 2026-02-23T13:05:41.799391692Z because new revision pending 2026-02-23T13:05:41.800624923Z W0223 13:05:41.800578 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:05:41.800624923Z W0223 13:05:41.800599 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:41.800624923Z W0223 13:05:41.800603 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:05:41.800624923Z W0223 13:05:41.800607 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:41.800624923Z W0223 13:05:41.800611 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-23T13:05:41.820757374Z I0223 13:05:41.820697 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:41.821270397Z I0223 13:05:41.821205 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:41.860338618Z I0223 13:05:41.859212 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3" 2026-02-23T13:05:42.390609133Z I0223 13:05:42.390497 1 request.go:700] Waited for 1.196678882s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 2026-02-23T13:05:43.193748951Z I0223 13:05:43.193652 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:43.193865724Z E0223 13:05:43.193815 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:44.594164964Z I0223 13:05:44.594064 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:44.594312207Z E0223 13:05:44.594228 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:45.392079808Z I0223 13:05:45.391911 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:45.392079808Z E0223 13:05:45.392029 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:46.193888152Z I0223 13:05:46.193789 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:46.193937794Z E0223 13:05:46.193885 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:47.194876470Z I0223 13:05:47.194751 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:47.195402834Z E0223 13:05:47.195357 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:47.993403382Z I0223 13:05:47.993213 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:47.993642148Z E0223 13:05:47.993526 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:48.794340683Z E0223 13:05:48.794222 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:48.794979289Z I0223 13:05:48.794900 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:50.398826634Z E0223 13:05:50.398723 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:50.398914986Z I0223 13:05:50.398850 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:52.219776007Z E0223 13:05:52.219674 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-controller-manager), \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:leader-locking-kube-controller-manager), \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:leader-election-lock-cluster-policy-controller)]" 2026-02-23T13:05:52.222845105Z I0223 13:05:52.222740 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-controller-manager)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:leader-locking-kube-controller-manager)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:leader-election-lock-cluster-policy-controller)\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:52.223327297Z I0223 13:05:52.223271 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:52.235045744Z I0223 13:05:52.234956 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-controller-manager)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:leader-locking-kube-controller-manager)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:leader-election-lock-cluster-policy-controller)\nKubeControllerManagerStaticResourcesDegraded: " 2026-02-23T13:05:53.797098028Z I0223 13:05:53.797014 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:53.797132719Z E0223 13:05:53.797118 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:56.614953134Z W0223 13:05:56.614849 1 dynamic_operator_client.go:355] .status.conditions["KubeControllerManagerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:56.649822509Z I0223 13:05:56.649710 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:56.650949378Z I0223 13:05:56.650874 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:19Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:18Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:56.664122772Z I0223 13:05:56.663967 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-controller-manager)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:leader-locking-kube-controller-manager)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:leader-election-lock-cluster-policy-controller)\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready" 2026-02-23T13:05:56.736212221Z I0223 13:05:56.733230 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-master-0 -n openshift-kube-controller-manager because it was missing 2026-02-23T13:05:56.806049113Z E0223 13:05:56.805919 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-23T13:05:56.806084224Z I0223 13:05:56.806016 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-23T13:05:57.791550648Z I0223 13:05:57.789700 1 request.go:700] Waited for 1.060751535s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller 2026-02-23T13:05:57.992621430Z I0223 13:05:57.992561 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-02-23T13:05:58.790277999Z I0223 13:05:58.790164 1 request.go:700] Waited for 1.19259186s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 kube-controller-manager-operator_previous.log0000640000000000000000000004546215147050273044665 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-7bcfbc574b-jpf5n2026-02-23T13:02:28.120122331Z I0223 13:02:28.120086 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="e49b4e47d2ff7e14fb6fc72668e935ece18a426a6b388566a7b9b4a151859a96") 2026-02-23T13:02:28.120588755Z I0223 13:02:28.120524 1 base_controller.go:181] Shutting down GuardController ... 2026-02-23T13:02:28.120588755Z I0223 13:02:28.120579 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-02-23T13:02:28.120632076Z I0223 13:02:28.120607 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-02-23T13:02:28.120632076Z I0223 13:02:28.120614 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-02-23T13:02:28.120632076Z I0223 13:02:28.120626 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-02-23T13:02:28.120653157Z I0223 13:02:28.120639 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-02-23T13:02:28.120670317Z I0223 13:02:28.120652 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-02-23T13:02:28.120670317Z I0223 13:02:28.120664 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-02-23T13:02:28.120687908Z I0223 13:02:28.120674 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.120732 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.120781 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.120813 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.120950 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121025 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121041 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121059 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121073 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121088 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121091 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121117 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121192 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121217 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121227 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121299 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121439 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121457 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121468 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121476 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121486 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.120782 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121585 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121899 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121909 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121923 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.121928 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122033 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122049 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122112 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-782581868/tls.crt::/tmp/serving-cert-782581868/tls.key" 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122149 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122149 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122157 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122189 1 controller_manager.go:54] GuardController controller terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122224 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122237 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122266 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122276 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122284 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122294 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122298 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122306 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122312 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122317 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122321 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122326 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122333 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-23T13:02:28.122356937Z I0223 13:02:28.122337 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-23T13:02:28.122472880Z I0223 13:02:28.122391 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-02-23T13:02:28.122472880Z I0223 13:02:28.122412 1 base_controller.go:181] Shutting down PruneController ... 2026-02-23T13:02:28.122472880Z I0223 13:02:28.122428 1 base_controller.go:181] Shutting down Installer ... 2026-02-23T13:02:28.122493281Z I0223 13:02:28.122479 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-23T13:02:28.122511271Z I0223 13:02:28.122491 1 builder.go:335] server exited 2026-02-23T13:02:28.122511271Z I0223 13:02:28.122500 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-02-23T13:02:28.122511271Z I0223 13:02:28.122507 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-02-23T13:02:28.122544552Z I0223 13:02:28.122521 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-02-23T13:02:28.122544552Z I0223 13:02:28.122530 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-02-23T13:02:28.122544552Z I0223 13:02:28.122541 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-02-23T13:02:28.122563803Z I0223 13:02:28.122548 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-23T13:02:28.122563803Z I0223 13:02:28.122552 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-23T13:02:28.122563803Z I0223 13:02:28.122556 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-23T13:02:28.122582474Z I0223 13:02:28.122565 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-02-23T13:02:28.122582474Z I0223 13:02:28.122570 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-02-23T13:02:28.122600064Z I0223 13:02:28.122580 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-02-23T13:02:28.122616745Z I0223 13:02:28.122599 1 request.go:700] Waited for 1.059597955s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager 2026-02-23T13:02:28.122786440Z I0223 13:02:28.122704 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-23T13:02:28.122786440Z I0223 13:02:28.122715 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-23T13:02:28.122786440Z I0223 13:02:28.122720 1 controller_manager.go:54] PruneController controller terminated 2026-02-23T13:02:28.123044887Z I0223 13:02:28.122998 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3b3b72a4-dcc1-4645-9158-07609f55916c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'SecretCreateFailed' Failed to create Secret/localhost-recovery-client-token-3 -n openshift-kube-controller-manager: client rate limiter Wait returned an error: context canceled 2026-02-23T13:02:28.124175030Z W0223 13:02:28.124084 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:02:28.124175030Z W0223 13:02:28.124103 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:02:28.124175030Z W0223 13:02:28.124109 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-23T13:02:28.124331475Z E0223 13:02:28.124253 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:28.127346354Z E0223 13:02:28.125184 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:28.127346354Z I0223 13:02:28.125656 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-23T13:02:28.127346354Z I0223 13:02:28.125671 1 base_controller.go:113] All Installer workers have been terminated 2026-02-23T13:02:28.127346354Z I0223 13:02:28.125678 1 controller_manager.go:54] Installer controller terminated 2026-02-23T13:02:28.127346354Z I0223 13:02:28.126760 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-02-23T13:02:28.127346354Z I0223 13:02:28.126797 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-02-23T13:02:28.127346354Z W0223 13:02:28.126926 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-02-23T13:02:28.127346354Z E0223 13:02:28.126959 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:28.127346354Z E0223 13:02:28.127054 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:28.127728065Z E0223 13:02:28.127665 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/ns.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/leader-election-cluster-policy-controller-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-security-allocation-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-security-allocation-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-syncer-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-syncer-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-privileged-namespaces-syncer-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-privileged-namespaces-syncer-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-openshift-infra.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/recycler-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-23T13:02:28.128161378Z I0223 13:02:28.128069 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-23T13:02:28.128161378Z I0223 13:02:28.128113 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-23T13:02:28.128161378Z I0223 13:02:28.128120 1 controller_manager.go:54] RevisionController controller terminated 2026-02-23T13:02:28.128278311Z I0223 13:02:28.128188 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-23T13:02:28.128278311Z I0223 13:02:28.128235 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-23T13:02:28.129291951Z I0223 13:02:28.129215 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-02-23T13:02:28.129291951Z I0223 13:02:28.129257 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-02-23T13:02:28.132401613Z W0223 13:02:28.132330 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-7bcfbc574b-jpf5n.json0000640000000000000000000001451015147050273033573 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-7bcfbc574b-jpf5n","generateName":"kube-controller-manager-operator-7bcfbc574b-","namespace":"openshift-kube-controller-manager-operator","uid":"b1970ec8-620e-4529-bf3b-1cf9a52c27d3","resourceVersion":"9404","creationTimestamp":"2026-02-23T12:59:07Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"7bcfbc574b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-7bcfbc574b","uid":"e6ab593d-a004-4624-95f5-41d297769a36","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1a3bef9a43438ab475af89a16225f015c17bff1244015493a6a42c049a922ea4"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-23T13:02:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T13:01:17Z","finishedAt":"2026-02-23T13:02:28Z","containerID":"cri-o://723e0d3ac0bfebcf9019d23491b2a123aaa94b496865e7bf006a731caaf79830"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","containerID":"cri-o://90c4d565bc8a9a3504b08ffb42ce37fbe9564d90f4149f9a2efe531a546f0e50","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000001665215147050273031011 0ustar00000000000000002026-02-23T13:02:18.021673674Z I0223 13:02:18.021364 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00073f680 cert-dir:0xc00073f860 cert-secrets:0xc00073f5e0 configmaps:0xc00073f180 namespace:0xc00073efa0 optional-cert-configmaps:0xc00073f7c0 optional-configmaps:0xc00073f2c0 optional-secrets:0xc00073f220 pod:0xc00073f040 pod-manifest-dir:0xc00073f400 resource-dir:0xc00073f360 revision:0xc00073ef00 secrets:0xc00073f0e0 v:0xc00033cdc0] [0xc00033cdc0 0xc00073ef00 0xc00073efa0 0xc00073f040 0xc00073f360 0xc00073f400 0xc00073f180 0xc00073f2c0 0xc00073f0e0 0xc00073f220 0xc00073f860 0xc00073f680 0xc00073f7c0 0xc00073f5e0] [] map[cert-configmaps:0xc00073f680 cert-dir:0xc00073f860 cert-secrets:0xc00073f5e0 configmaps:0xc00073f180 help:0xc00033d540 kubeconfig:0xc00073ee60 log-flush-frequency:0xc00033ca00 namespace:0xc00073efa0 optional-cert-configmaps:0xc00073f7c0 optional-cert-secrets:0xc00073f720 optional-configmaps:0xc00073f2c0 optional-secrets:0xc00073f220 pod:0xc00073f040 pod-manifest-dir:0xc00073f400 pod-manifests-lock-file:0xc00073f540 resource-dir:0xc00073f360 revision:0xc00073ef00 secrets:0xc00073f0e0 timeout-duration:0xc00073f4a0 v:0xc00033cdc0 vmodule:0xc00033cf00] [0xc00073ee60 0xc00073ef00 0xc00073efa0 0xc00073f040 0xc00073f0e0 0xc00073f180 0xc00073f220 0xc00073f2c0 0xc00073f360 0xc00073f400 0xc00073f4a0 0xc00073f540 0xc00073f5e0 0xc00073f680 0xc00073f720 0xc00073f7c0 0xc00073f860 0xc00033ca00 0xc00033cdc0 0xc00033cf00 0xc00033d540] [0xc00073f680 0xc00073f860 0xc00073f5e0 0xc00073f180 0xc00033d540 0xc00073ee60 0xc00033ca00 0xc00073efa0 0xc00073f7c0 0xc00073f720 0xc00073f2c0 0xc00073f220 0xc00073f040 0xc00073f400 0xc00073f540 0xc00073f360 0xc00073ef00 0xc00073f0e0 0xc00073f4a0 0xc00033cdc0 0xc00033cf00] map[104:0xc00033d540 118:0xc00033cdc0] [] -1 0 0xc00092a3f0 true 0x77b500 []} 2026-02-23T13:02:18.021673674Z I0223 13:02:18.021660 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0002f0820)({ 2026-02-23T13:02:18.021673674Z KubeConfig: (string) "", 2026-02-23T13:02:18.021673674Z KubeClient: (kubernetes.Interface) , 2026-02-23T13:02:18.021673674Z Revision: (string) (len=1) "2", 2026-02-23T13:02:18.021673674Z NodeName: (string) "", 2026-02-23T13:02:18.021673674Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-02-23T13:02:18.021673674Z Clock: (clock.RealClock) { 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-02-23T13:02:18.021673674Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-23T13:02:18.021673674Z (string) (len=27) "service-account-private-key", 2026-02-23T13:02:18.021673674Z (string) (len=31) "localhost-recovery-client-token" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:18.021673674Z (string) (len=12) "serving-cert" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-23T13:02:18.021673674Z (string) (len=27) "kube-controller-manager-pod", 2026-02-23T13:02:18.021673674Z (string) (len=6) "config", 2026-02-23T13:02:18.021673674Z (string) (len=32) "cluster-policy-controller-config", 2026-02-23T13:02:18.021673674Z (string) (len=29) "controller-manager-kubeconfig", 2026-02-23T13:02:18.021673674Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-02-23T13:02:18.021673674Z (string) (len=17) "serviceaccount-ca", 2026-02-23T13:02:18.021673674Z (string) (len=10) "service-ca", 2026-02-23T13:02:18.021673674Z (string) (len=15) "recycler-config" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:18.021673674Z (string) (len=12) "cloud-config" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-02-23T13:02:18.021673674Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-02-23T13:02:18.021673674Z (string) (len=10) "csr-signer" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-23T13:02:18.021673674Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-23T13:02:18.021673674Z (string) (len=20) "aggregator-client-ca", 2026-02-23T13:02:18.021673674Z (string) (len=9) "client-ca" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:18.021673674Z (string) (len=17) "trusted-ca-bundle" 2026-02-23T13:02:18.021673674Z }, 2026-02-23T13:02:18.021673674Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-02-23T13:02:18.021673674Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T13:02:18.021673674Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T13:02:18.021673674Z Timeout: (time.Duration) 2m0s, 2026-02-23T13:02:18.021673674Z StaticPodManifestsLockFile: (string) "", 2026-02-23T13:02:18.021673674Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T13:02:18.021673674Z KubeletVersion: (string) "" 2026-02-23T13:02:18.021673674Z }) 2026-02-23T13:02:18.022683354Z I0223 13:02:18.022622 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T13:02:18.030719360Z I0223 13:02:18.030671 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T13:02:18.030761682Z I0223 13:02:18.030733 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:02:18.030761682Z I0223 13:02:18.030750 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:02:18.032742080Z I0223 13:02:18.032699 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-23T13:02:28.037944660Z I0223 13:02:28.037849 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-23T13:02:52.036173252Z W0223 13:02:52.036041 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:03:12.034795366Z W0223 13:03:12.034665 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:03:32.036523593Z W0223 13:03:32.036434 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:03:46.041358643Z W0223 13:03:46.039599 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:03:46.041358643Z F0223 13:03:46.039690 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-controller-manager/installer-2-master-0.json0000640000000000000000000001717015147050273024472 0ustar0000000000000000{"metadata":{"name":"installer-2-master-0","namespace":"openshift-kube-controller-manager","uid":"2d8a9026-ee0a-44c4-9c90-cd863f5461dd","resourceVersion":"9639","creationTimestamp":"2026-02-23T13:02:15Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.49/23\"],\"mac_address\":\"0a:58:0a:80:00:31\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.49/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.49\"\n ],\n \"mac\": \"0a:58:0a:80:00:31\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-2","uid":"c3a281c2-e738-4843-a95d-cd3e64111197"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=2","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-t58wm"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:04:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:15Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:04:44Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:04:44Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:15Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.49","podIPs":[{"ip":"10.128.0.49"}],"startTime":"2026-02-23T13:02:15Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0223 13:02:18.022622 1 cmd.go:413] Getting controller reference for node master-0\nI0223 13:02:18.030671 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0223 13:02:18.030733 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0223 13:02:18.030750 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0223 13:02:18.032699 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0223 13:02:28.037849 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0223 13:02:52.036041 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0223 13:03:12.034665 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0223 13:03:32.036434 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0223 13:03:46.039599 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0223 13:03:46.039690 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-02-23T13:02:17Z","finishedAt":"2026-02-23T13:03:46Z","containerID":"cri-o://76debd76d1c83d2501b62235b0e22ba16bdbcca50bf40d8506d768b4e775ec89"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","containerID":"cri-o://76debd76d1c83d2501b62235b0e22ba16bdbcca50bf40d8506d768b4e775ec89","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715147050273027207 0ustar00000000000000002026-02-23T13:02:06.232514864Z I0223 13:02:06.230846 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000725a40 cert-dir:0xc000725c20 cert-secrets:0xc0007259a0 configmaps:0xc000725540 namespace:0xc000725360 optional-cert-configmaps:0xc000725b80 optional-cert-secrets:0xc000725ae0 optional-configmaps:0xc000725680 optional-secrets:0xc0007255e0 pod:0xc000725400 pod-manifest-dir:0xc0007257c0 resource-dir:0xc000725720 revision:0xc0007252c0 secrets:0xc0007254a0 v:0xc0006eda40] [0xc0006eda40 0xc0007252c0 0xc000725360 0xc000725400 0xc000725720 0xc0007257c0 0xc000725540 0xc000725680 0xc0007254a0 0xc0007255e0 0xc000725c20 0xc000725a40 0xc000725b80 0xc0007259a0 0xc000725ae0] [] map[cert-configmaps:0xc000725a40 cert-dir:0xc000725c20 cert-secrets:0xc0007259a0 configmaps:0xc000725540 help:0xc0006ede00 kubeconfig:0xc000725220 log-flush-frequency:0xc0006ed9a0 namespace:0xc000725360 optional-cert-configmaps:0xc000725b80 optional-cert-secrets:0xc000725ae0 optional-configmaps:0xc000725680 optional-secrets:0xc0007255e0 pod:0xc000725400 pod-manifest-dir:0xc0007257c0 pod-manifests-lock-file:0xc000725900 resource-dir:0xc000725720 revision:0xc0007252c0 secrets:0xc0007254a0 timeout-duration:0xc000725860 v:0xc0006eda40 vmodule:0xc0006edae0] [0xc000725220 0xc0007252c0 0xc000725360 0xc000725400 0xc0007254a0 0xc000725540 0xc0007255e0 0xc000725680 0xc000725720 0xc0007257c0 0xc000725860 0xc000725900 0xc0007259a0 0xc000725a40 0xc000725ae0 0xc000725b80 0xc000725c20 0xc0006ed9a0 0xc0006eda40 0xc0006edae0 0xc0006ede00] [0xc000725a40 0xc000725c20 0xc0007259a0 0xc000725540 0xc0006ede00 0xc000725220 0xc0006ed9a0 0xc000725360 0xc000725b80 0xc000725ae0 0xc000725680 0xc0007255e0 0xc000725400 0xc0007257c0 0xc000725900 0xc000725720 0xc0007252c0 0xc0007254a0 0xc000725860 0xc0006eda40 0xc0006edae0] map[104:0xc0006ede00 118:0xc0006eda40] [] -1 0 0xc0003aa300 true 0xae1c20 []} 2026-02-23T13:02:06.232514864Z I0223 13:02:06.231190 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000af71e0)({ 2026-02-23T13:02:06.232514864Z KubeConfig: (string) "", 2026-02-23T13:02:06.232514864Z KubeClient: (kubernetes.Interface) , 2026-02-23T13:02:06.232514864Z Revision: (string) (len=1) "1", 2026-02-23T13:02:06.232514864Z NodeName: (string) "", 2026-02-23T13:02:06.232514864Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-23T13:02:06.232514864Z Clock: (clock.RealClock) { 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-23T13:02:06.232514864Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-23T13:02:06.232514864Z (string) (len=11) "etcd-client", 2026-02-23T13:02:06.232514864Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-23T13:02:06.232514864Z (string) (len=31) "localhost-recovery-client-token" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-23T13:02:06.232514864Z (string) (len=17) "encryption-config", 2026-02-23T13:02:06.232514864Z (string) (len=21) "webhook-authenticator" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-23T13:02:06.232514864Z (string) (len=18) "kube-apiserver-pod", 2026-02-23T13:02:06.232514864Z (string) (len=6) "config", 2026-02-23T13:02:06.232514864Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-23T13:02:06.232514864Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-23T13:02:06.232514864Z (string) (len=15) "etcd-serving-ca", 2026-02-23T13:02:06.232514864Z (string) (len=18) "kubelet-serving-ca", 2026-02-23T13:02:06.232514864Z (string) (len=22) "sa-token-signing-certs", 2026-02-23T13:02:06.232514864Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-23T13:02:06.232514864Z (string) (len=14) "oauth-metadata", 2026-02-23T13:02:06.232514864Z (string) (len=12) "cloud-config", 2026-02-23T13:02:06.232514864Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-23T13:02:06.232514864Z (string) (len=17) "aggregator-client", 2026-02-23T13:02:06.232514864Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-23T13:02:06.232514864Z (string) (len=31) "service-network-serving-certkey", 2026-02-23T13:02:06.232514864Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-23T13:02:06.232514864Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-23T13:02:06.232514864Z (string) (len=33) "bound-service-account-signing-key", 2026-02-23T13:02:06.232514864Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-23T13:02:06.232514864Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-23T13:02:06.232514864Z (string) (len=14) "kubelet-client", 2026-02-23T13:02:06.232514864Z (string) (len=16) "node-kubeconfigs" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-23T13:02:06.232514864Z (string) (len=17) "user-serving-cert", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-000", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-001", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-002", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-003", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-004", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-005", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-006", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-007", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-008", 2026-02-23T13:02:06.232514864Z (string) (len=21) "user-serving-cert-009" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-23T13:02:06.232514864Z (string) (len=20) "aggregator-client-ca", 2026-02-23T13:02:06.232514864Z (string) (len=9) "client-ca", 2026-02-23T13:02:06.232514864Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-23T13:02:06.232514864Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:02:06.232514864Z (string) (len=17) "trusted-ca-bundle" 2026-02-23T13:02:06.232514864Z }, 2026-02-23T13:02:06.232514864Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-23T13:02:06.232514864Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T13:02:06.232514864Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T13:02:06.232514864Z Timeout: (time.Duration) 2m0s, 2026-02-23T13:02:06.232514864Z StaticPodManifestsLockFile: (string) "", 2026-02-23T13:02:06.232514864Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T13:02:06.232514864Z KubeletVersion: (string) "" 2026-02-23T13:02:06.232514864Z }) 2026-02-23T13:02:06.232514864Z I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T13:02:06.253556304Z I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T13:02:06.315389125Z I0223 13:02:06.253235 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:02:06.315435237Z I0223 13:02:06.315392 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:02:06.321081733Z I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-23T13:02:36.321761758Z I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0 2026-02-23T13:02:50.325897569Z F0223 13:02:50.325769 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115147050273022667 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"04a14e09-67c1-45e9-af34-bccb2fe3757e","resourceVersion":"9608","creationTimestamp":"2026-02-23T13:02:04Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.46/23\"],\"mac_address\":\"0a:58:0a:80:00:2e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.46/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.46\"\n ],\n \"mac\": \"0a:58:0a:80:00:2e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"a294e7f5-b17d-4c16-ab1a-8fbad65dd2bb"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:04Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:50Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:50Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:04Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.46","podIPs":[{"ip":"10.128.0.46"}],"startTime":"2026-02-23T13:02:04Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nI0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nF0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-23T13:02:05Z","finishedAt":"2026-02-23T13:02:50Z","containerID":"cri-o://88e0e24f4f045d3a42d1ee4cfb99a951aeace5cf2e7bece4bd5f41827f8965f5"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","containerID":"cri-o://88e0e24f4f045d3a42d1ee4cfb99a951aeace5cf2e7bece4bd5f41827f8965f5","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615147050273035767 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-23T12:58:47.525019978Z I0223 12:58:47.524492 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000007255715147050273032677 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-23T13:05:55.088685979Z W0223 13:05:55.088613 1 handler_proxy.go:100] no RequestInfo found in the context 2026-02-23T13:05:55.088729761Z E0223 13:05:55.088683 1 controller.go:146] "Unhandled Error" err=< 2026-02-23T13:05:55.088729761Z Error updating APIService "v1.packages.operators.coreos.com" with err: failed to download v1.packages.operators.coreos.com: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: service unavailable 2026-02-23T13:05:55.088729761Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-02-23T13:05:55.088729761Z > logger="UnhandledError" 2026-02-23T13:05:55.090332371Z E0223 13:05:55.090294 1 handler_proxy.go:152] error resolving openshift-operator-lifecycle-manager/packageserver-service: no endpoints available for service "packageserver-service" 2026-02-23T13:05:55.092470735Z I0223 13:05:55.092426 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.189176259Z I0223 13:05:55.189107 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.243379205Z I0223 13:05:55.243308 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.293449555Z I0223 13:05:55.293379 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.364628711Z E0223 13:05:55.364558 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T13:05:55.389030630Z I0223 13:05:55.388965 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.447424072Z I0223 13:05:55.444458 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.493301326Z I0223 13:05:55.493098 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.588683296Z I0223 13:05:55.588600 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.644397290Z I0223 13:05:55.644299 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.693309911Z I0223 13:05:55.693150 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.788620499Z I0223 13:05:55.788549 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.844111127Z I0223 13:05:55.844033 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.893091079Z I0223 13:05:55.893016 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:55.991696451Z I0223 13:05:55.991096 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.033410429Z I0223 13:05:56.033287 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=71 seatDemandAvg=32.752002921180384 seatDemandStdev=14.643523081662213 seatDemandSmoothed=47.3955260028426 fairFrac=2.2593307354853867 currentCL=71 concurrencyDenominator=71 backstop=false 2026-02-23T13:05:56.043708280Z I0223 13:05:56.043670 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.079100258Z W0223 13:05:56.079017 1 handler_proxy.go:100] no RequestInfo found in the context 2026-02-23T13:05:56.079140139Z W0223 13:05:56.079111 1 handler_proxy.go:100] no RequestInfo found in the context 2026-02-23T13:05:56.079157570Z E0223 13:05:56.079143 1 controller.go:113] "Unhandled Error" err="loading OpenAPI spec for \"v1.packages.operators.coreos.com\" failed with: Error, could not get list of group versions for APIService" logger="UnhandledError" 2026-02-23T13:05:56.079212541Z E0223 13:05:56.079165 1 controller.go:102] "Unhandled Error" err=< 2026-02-23T13:05:56.079212541Z loading OpenAPI spec for "v1.packages.operators.coreos.com" failed with: failed to download v1.packages.operators.coreos.com: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: service unavailable 2026-02-23T13:05:56.079212541Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-02-23T13:05:56.079212541Z > logger="UnhandledError" 2026-02-23T13:05:56.080349780Z I0223 13:05:56.080311 1 controller.go:126] OpenAPI AggregationController: action for item v1.packages.operators.coreos.com: Rate Limited Requeue. 2026-02-23T13:05:56.080451193Z I0223 13:05:56.080420 1 controller.go:109] OpenAPI AggregationController: action for item v1.packages.operators.coreos.com: Rate Limited Requeue. 2026-02-23T13:05:56.092523789Z I0223 13:05:56.092462 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.188729600Z I0223 13:05:56.188651 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.244370422Z I0223 13:05:56.244292 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.293482938Z I0223 13:05:56.293409 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.389053953Z I0223 13:05:56.388954 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.444186762Z I0223 13:05:56.444085 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.492517698Z I0223 13:05:56.492453 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.589030157Z I0223 13:05:56.588679 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.644402402Z I0223 13:05:56.644346 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.693007465Z I0223 13:05:56.692902 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.712604342Z I0223 13:05:56.712496 1 trace.go:236] Trace[1606408880]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:7b7a63c4-9b68-4dab-8d2c-4de0af880409,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-operator-lifecycle-manager,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-operator-lifecycle-manager/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:55.081) (total time: 1630ms): 2026-02-23T13:05:56.712604342Z Trace[1606408880]: ["List(recursive=false) etcd3" audit-id:7b7a63c4-9b68-4dab-8d2c-4de0af880409,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 1630ms (13:05:55.081)] 2026-02-23T13:05:56.712604342Z Trace[1606408880]: [1.630954661s] [1.630954661s] END 2026-02-23T13:05:56.712604342Z I0223 13:05:56.712556 1 trace.go:236] Trace[1672381168]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:24d1d01e-739a-4dc2-bdef-76ac21b80884,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-marketplace,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-marketplace/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:50.286) (total time: 6425ms): 2026-02-23T13:05:56.712604342Z Trace[1672381168]: ["List(recursive=false) etcd3" audit-id:24d1d01e-739a-4dc2-bdef-76ac21b80884,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 6425ms (13:05:50.286)] 2026-02-23T13:05:56.712604342Z Trace[1672381168]: [6.425961364s] [6.425961364s] END 2026-02-23T13:05:56.712719025Z I0223 13:05:56.712497 1 trace.go:236] Trace[1243847110]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:a0635021-fc5c-4340-9ab7-91355bfc4e68,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-cloud-controller-manager-operator,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-cloud-controller-manager-operator/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:55.107) (total time: 1604ms): 2026-02-23T13:05:56.712719025Z Trace[1243847110]: ["List(recursive=false) etcd3" audit-id:a0635021-fc5c-4340-9ab7-91355bfc4e68,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 1604ms (13:05:55.107)] 2026-02-23T13:05:56.712719025Z Trace[1243847110]: [1.604596073s] [1.604596073s] END 2026-02-23T13:05:56.712861549Z I0223 13:05:56.712808 1 trace.go:236] Trace[1796849942]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:ee5a4192-47fe-477d-96d3-3ddcb94ed5fe,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-etcd,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-etcd/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:44.946) (total time: 11766ms): 2026-02-23T13:05:56.712861549Z Trace[1796849942]: ["List(recursive=false) etcd3" audit-id:ee5a4192-47fe-477d-96d3-3ddcb94ed5fe,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 11766ms (13:05:44.946)] 2026-02-23T13:05:56.712861549Z Trace[1796849942]: [11.766171051s] [11.766171051s] END 2026-02-23T13:05:56.712893159Z I0223 13:05:56.712863 1 trace.go:236] Trace[1820243895]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:76e55ee2-e41d-499d-a953-e1177b01ae7c,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-cluster-machine-approver,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-cluster-machine-approver/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:52.055) (total time: 4657ms): 2026-02-23T13:05:56.712893159Z Trace[1820243895]: ["List(recursive=false) etcd3" audit-id:76e55ee2-e41d-499d-a953-e1177b01ae7c,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 4657ms (13:05:52.055)] 2026-02-23T13:05:56.712893159Z Trace[1820243895]: [4.657118093s] [4.657118093s] END 2026-02-23T13:05:56.712910320Z I0223 13:05:56.712884 1 trace.go:236] Trace[2100149366]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:32b2997a-6be6-47cc-85a4-1be8c164126c,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-machine-api,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-machine-api/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:55.076) (total time: 1636ms): 2026-02-23T13:05:56.712910320Z Trace[2100149366]: ["List(recursive=false) etcd3" audit-id:32b2997a-6be6-47cc-85a4-1be8c164126c,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 1636ms (13:05:55.076)] 2026-02-23T13:05:56.712910320Z Trace[2100149366]: [1.636144753s] [1.636144753s] END 2026-02-23T13:05:56.713105635Z I0223 13:05:56.712810 1 trace.go:236] Trace[19177669]: "List" accept:application/vnd.kubernetes.protobuf, */*,audit-id:0a1a188c-d3d9-425b-9f5a-e373bd26c977,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-kube-controller-manager,protocol:HTTP/2.0,resource:limitranges,scope:namespace,url:/api/v1/namespaces/openshift-kube-controller-manager/limitranges,user-agent:kube-apiserver/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:LIST (23-Feb-2026 13:05:43.994) (total time: 12718ms): 2026-02-23T13:05:56.713105635Z Trace[19177669]: ["List(recursive=false) etcd3" audit-id:0a1a188c-d3d9-425b-9f5a-e373bd26c977,key:/limitranges,resourceVersion:,resourceVersionMatch:,limit:1,continue: 12718ms (13:05:43.994)] 2026-02-23T13:05:56.713105635Z Trace[19177669]: [12.718634697s] [12.718634697s] END 2026-02-23T13:05:56.722370890Z I0223 13:05:56.722296 1 trace.go:236] Trace[978510283]: "Create" accept:application/vnd.kubernetes.protobuf, */*,audit-id:89450601-5f2b-47d5-acc0-0bb67a5a16cc,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-cloud-controller-manager-operator,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-cloud-controller-manager-operator/pods,user-agent:kube-controller-manager/v1.31.14 (linux/amd64) kubernetes/8311c4d/system:serviceaccount:kube-system:replicaset-controller,verb:POST (23-Feb-2026 13:05:55.103) (total time: 1618ms): 2026-02-23T13:05:56.722370890Z Trace[978510283]: [1.618937046s] [1.618937046s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.729496 1 trace.go:236] Trace[640126323]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:224bd6e9-2710-43c3-9eee-22b558a04cde,client:10.128.0.18,api-group:,api-version:v1,name:,subresource:,namespace:openshift-kube-controller-manager,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-kube-controller-manager/pods,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 13:05:43.991) (total time: 12737ms): 2026-02-23T13:05:56.735874613Z Trace[640126323]: [12.737963508s] [12.737963508s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.730071 1 trace.go:236] Trace[94369655]: "Create" accept:application/vnd.kubernetes.protobuf, */*,audit-id:40c03009-f908-4dfe-9a9d-e7f5639de99d,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-cluster-machine-approver,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-cluster-machine-approver/pods,user-agent:kube-controller-manager/v1.31.14 (linux/amd64) kubernetes/8311c4d/system:serviceaccount:kube-system:replicaset-controller,verb:POST (23-Feb-2026 13:05:52.054) (total time: 4675ms): 2026-02-23T13:05:56.735874613Z Trace[94369655]: [4.675598323s] [4.675598323s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.730105 1 trace.go:236] Trace[910498298]: "Create" accept:application/vnd.kubernetes.protobuf, */*,audit-id:e2a25a30-7a45-488d-936e-4c8ad8cb0a89,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-operator-lifecycle-manager,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-operator-lifecycle-manager/pods,user-agent:kube-controller-manager/v1.31.14 (linux/amd64) kubernetes/8311c4d/system:serviceaccount:kube-system:replicaset-controller,verb:POST (23-Feb-2026 13:05:55.080) (total time: 1649ms): 2026-02-23T13:05:56.735874613Z Trace[910498298]: [1.649766119s] [1.649766119s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.730758 1 trace.go:236] Trace[1181044569]: "Create" accept:application/json, */*,audit-id:6d717fb7-523e-44d5-b2f7-e8e192a873d0,client:10.128.0.59,api-group:,api-version:v1,name:,subresource:,namespace:openshift-marketplace,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-marketplace/pods,user-agent:catalog/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 13:05:50.485) (total time: 6245ms): 2026-02-23T13:05:56.735874613Z Trace[1181044569]: [6.245701211s] [6.245701211s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.730866 1 trace.go:236] Trace[1694570252]: "Create" accept:application/json, */*,audit-id:e032c13b-93f0-4914-9e62-8fe89873fed3,client:10.128.0.59,api-group:,api-version:v1,name:,subresource:,namespace:openshift-marketplace,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-marketplace/pods,user-agent:catalog/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 13:05:50.284) (total time: 6446ms): 2026-02-23T13:05:56.735874613Z Trace[1694570252]: [6.446084755s] [6.446084755s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.731161 1 trace.go:236] Trace[366360920]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:06bcf11e-2d0e-4122-b055-271f696b11f2,client:192.168.32.10,api-group:,api-version:v1,name:,subresource:,namespace:openshift-etcd,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-etcd/pods,user-agent:kubelet/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:POST (23-Feb-2026 13:05:44.940) (total time: 11791ms): 2026-02-23T13:05:56.735874613Z Trace[366360920]: [11.791077602s] [11.791077602s] END 2026-02-23T13:05:56.735874613Z I0223 13:05:56.731460 1 trace.go:236] Trace[629289387]: "Create" accept:application/vnd.kubernetes.protobuf, */*,audit-id:af59e7bd-8bf7-4bf5-8034-4aa7ccdadeb0,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-machine-api,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-machine-api/pods,user-agent:kube-controller-manager/v1.31.14 (linux/amd64) kubernetes/8311c4d/system:serviceaccount:kube-system:replicaset-controller,verb:POST (23-Feb-2026 13:05:55.075) (total time: 1656ms): 2026-02-23T13:05:56.735874613Z Trace[629289387]: [1.656267324s] [1.656267324s] END 2026-02-23T13:05:56.776174995Z I0223 13:05:56.775233 1 alloc.go:330] "allocated clusterIPs" service="openshift-marketplace/certified-operators" clusterIPs={"IPv4":"172.30.240.142"} 2026-02-23T13:05:56.795271890Z I0223 13:05:56.794368 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.796049399Z I0223 13:05:56.795997 1 alloc.go:330] "allocated clusterIPs" service="openshift-marketplace/community-operators" clusterIPs={"IPv4":"172.30.141.204"} 2026-02-23T13:05:56.843608316Z I0223 13:05:56.843548 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.892858606Z I0223 13:05:56.892786 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:56.988480732Z I0223 13:05:56.988423 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.043989330Z I0223 13:05:57.043912 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.093194929Z I0223 13:05:57.093097 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.188786804Z I0223 13:05:57.188708 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.244114458Z I0223 13:05:57.244036 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.293081981Z I0223 13:05:57.293008 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.338622136Z I0223 13:05:57.337580 1 alloc.go:330] "allocated clusterIPs" service="openshift-marketplace/redhat-marketplace" clusterIPs={"IPv4":"172.30.141.146"} 2026-02-23T13:05:57.389099847Z I0223 13:05:57.389032 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.492986353Z I0223 13:05:57.492877 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.588486956Z I0223 13:05:57.588425 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.693490070Z I0223 13:05:57.692960 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.711786334Z I0223 13:05:57.711699 1 alloc.go:330] "allocated clusterIPs" service="openshift-marketplace/redhat-operators" clusterIPs={"IPv4":"172.30.12.105"} 2026-02-23T13:05:57.789419694Z I0223 13:05:57.789343 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.892702205Z I0223 13:05:57.892642 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:57.988704541Z I0223 13:05:57.988627 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T13:05:58.093202732Z I0223 13:05:58.093123 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015147050273031147 0ustar00000000000000002026-02-23T12:58:43.901029482Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000025034415147050273037144 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-dgldn2026-02-23T13:05:46.963371857Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-23T13:05:46.963371857Z }, 2026-02-23T13:05:46.963371857Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:05:46.963371857Z (string) (len=17) "trusted-ca-bundle" 2026-02-23T13:05:46.963371857Z }, 2026-02-23T13:05:46.963371857Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-23T13:05:46.963371857Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T13:05:46.963371857Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T13:05:46.963371857Z Timeout: (time.Duration) 2m0s, 2026-02-23T13:05:46.963371857Z StaticPodManifestsLockFile: (string) "", 2026-02-23T13:05:46.963371857Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T13:05:46.963371857Z KubeletVersion: (string) "" 2026-02-23T13:05:46.963371857Z }) 2026-02-23T13:05:46.963371857Z I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T13:05:46.963371857Z I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T13:05:46.963371857Z I0223 13:02:06.253235 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:05:46.963371857Z I0223 13:02:06.315392 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:05:46.963371857Z I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-23T13:05:46.963371857Z I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0 2026-02-23T13:05:46.963371857Z F0223 13:02:50.325769 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:05:46.966026224Z W0223 13:05:46.965976 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:05:46.966026224Z W0223 13:05:46.966002 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:46.966026224Z W0223 13:05:46.966009 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-23T13:05:46.966268290Z I0223 13:05:46.966177 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' installer errors: installer: ving-cert", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-000", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-001", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-002", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-003", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-004", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-005", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-006", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-007", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-008", 2026-02-23T13:05:46.966268290Z (string) (len=21) "user-serving-cert-009" 2026-02-23T13:05:46.966268290Z }, 2026-02-23T13:05:46.966268290Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-23T13:05:46.966268290Z (string) (len=20) "aggregator-client-ca", 2026-02-23T13:05:46.966268290Z (string) (len=9) "client-ca", 2026-02-23T13:05:46.966268290Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-23T13:05:46.966268290Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-23T13:05:46.966268290Z }, 2026-02-23T13:05:46.966268290Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T13:05:46.966268290Z (string) (len=17) "trusted-ca-bundle" 2026-02-23T13:05:46.966268290Z }, 2026-02-23T13:05:46.966268290Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-23T13:05:46.966268290Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T13:05:46.966268290Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T13:05:46.966268290Z Timeout: (time.Duration) 2m0s, 2026-02-23T13:05:46.966268290Z StaticPodManifestsLockFile: (string) "", 2026-02-23T13:05:46.966268290Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T13:05:46.966268290Z KubeletVersion: (string) "" 2026-02-23T13:05:46.966268290Z }) 2026-02-23T13:05:46.966268290Z I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T13:05:46.966268290Z I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T13:05:46.966268290Z I0223 13:02:06.253235 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:05:46.966268290Z I0223 13:02:06.315392 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:05:46.966268290Z I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-23T13:05:46.966268290Z I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0 2026-02-23T13:05:46.966268290Z F0223 13:02:50.325769 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-23T13:05:47.022311332Z I0223 13:05:47.020896 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:02:01Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:04Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:47.026269772Z I0223 13:05:47.024439 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:47.037455016Z I0223 13:05:47.036345 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:05:47.053837992Z I0223 13:05:47.053224 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" 2026-02-23T13:05:47.167016464Z W0223 13:05:47.166928 1 dynamic_operator_client.go:355] .status.conditions["BackingResourceControllerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:47.200981255Z I0223 13:05:47.200887 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:47.201132749Z I0223 13:05:47.201067 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:05:47.202042422Z I0223 13:05:47.201982 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:02:01Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:04Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:47.213483563Z I0223 13:05:47.213339 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" 2026-02-23T13:05:47.565987077Z W0223 13:05:47.565842 1 dynamic_operator_client.go:352] .status.conditions["AuditPolicyDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:05:47.565987077Z W0223 13:05:47.565890 1 dynamic_operator_client.go:355] .status.conditions["AuditPolicyDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:47.602809791Z I0223 13:05:47.602647 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:47.604211867Z I0223 13:05:47.604148 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:05:47.604953985Z I0223 13:05:47.604870 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:02:01Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:04Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:47.621123606Z I0223 13:05:47.620988 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" 2026-02-23T13:05:47.957591773Z I0223 13:05:47.957437 1 request.go:700] Waited for 1.124659696s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-02-23T13:05:48.764516406Z E0223 13:05:48.764334 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery), \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client), \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)]" 2026-02-23T13:05:48.769000160Z I0223 13:05:48.768907 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:05:48.769182435Z I0223 13:05:48.769100 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\nKubeAPIServerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:02:01Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:04Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:48.770269052Z I0223 13:05:48.770188 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:48.793735058Z I0223 13:05:48.793581 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\nKubeAPIServerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" 2026-02-23T13:05:48.957566775Z I0223 13:05:48.957451 1 request.go:700] Waited for 1.196905898s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/localhost-recovery-client-token 2026-02-23T13:05:49.016903350Z I0223 13:05:49.016713 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:49.017849014Z I0223 13:05:49.017773 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\nKubeAPIServerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:02:01Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:04Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:49.022487162Z I0223 13:05:49.019780 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:05:49.035681937Z I0223 13:05:49.035304 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\nKubeAPIServerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\nKubeAPIServerStaticResourcesDegraded: " 2026-02-23T13:05:50.158138807Z I0223 13:05:50.157960 1 request.go:700] Waited for 1.387528446s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-audit-policies 2026-02-23T13:05:51.158540340Z I0223 13:05:51.158389 1 request.go:700] Waited for 1.375301096s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-02-23T13:05:51.846984238Z W0223 13:05:51.846912 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.105.180:8443: connect: connection refused 2026-02-23T13:05:52.021508706Z W0223 13:05:52.021064 1 dynamic_operator_client.go:355] .status.conditions["KubeAPIServerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:05:52.058207997Z I0223 13:05:52.058128 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-23T13:02:01Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-23T13:01:04Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-23T13:01:03Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-23T13:01:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-23T13:05:52.058321600Z I0223 13:05:52.058279 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-23T13:05:52.059570392Z I0223 13:05:52.059530 1 prune_controller.go:277] Nothing to prune 2026-02-23T13:05:52.071886425Z I0223 13:05:52.071805 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"bdd200c8-6b45-4c2a-9ff0-87c5326d5343", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\nKubeAPIServerStaticResourcesDegraded: " to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" 2026-02-23T13:05:52.850296154Z W0223 13:05:52.850172 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.105.180:8443: connect: connection refused 2026-02-23T13:05:53.157832567Z I0223 13:05:53.157737 1 request.go:700] Waited for 1.098625065s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-02-23T13:05:54.904405654Z W0223 13:05:54.904315 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.105.180:8443: connect: connection refused 2026-02-23T13:05:55.908391127Z W0223 13:05:55.908284 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.105.180:8443: connect: connection refused 2026-02-23T13:05:57.280995394Z I0223 13:05:57.280905 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. kube-apiserver-operator_previous.log0000640000000000000000000003525615147050273037341 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-dgldn2026-02-23T13:02:17.652024805Z I0223 13:02:17.650421 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651705 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651711 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650426 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651721 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650434 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651734 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650441 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651747 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650451 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651757 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650454 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651772 1 builder.go:335] server exited 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650460 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651785 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650474 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651801 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-02-23T13:02:17.652024805Z E0223 13:02:17.651798 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650485 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650494 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650499 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650514 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650524 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650535 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650551 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650567 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650591 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650605 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650616 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650625 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650634 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650642 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650667 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650675 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650682 1 base_controller.go:123] Shutting down worker of kube-apiserver-StartupMonitorPodCondition controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651903 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650738 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651915 1 base_controller.go:113] All kube-apiserver-StartupMonitorPodCondition workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651925 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651927 1 controller_manager.go:54] kube-apiserver-StartupMonitorPodCondition controller terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651931 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651937 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650772 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651950 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650783 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651962 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651917 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651969 1 controller_manager.go:54] PruneController controller terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.650792 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651951 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652024805Z I0223 13:02:17.651962 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652024805Z W0223 13:02:17.650792 1 base_controller.go:242] Updating status of "NodeKubeconfigController" failed: unable to ApplyStatus for operator using fieldManager "NodeKubeconfigController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-02-23T13:02:17.652024805Z E0223 13:02:17.652008 1 base_controller.go:279] "Unhandled Error" err="NodeKubeconfigController reconciliation failed: \"secret/node-kubeconfigs\": unexpected error when reading response body. Please retry. Original error: context canceled" 2026-02-23T13:02:17.652088236Z I0223 13:02:17.650799 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652088236Z I0223 13:02:17.652031 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652088236Z I0223 13:02:17.650805 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652088236Z I0223 13:02:17.652045 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652088236Z I0223 13:02:17.650840 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-23T13:02:17.652088236Z I0223 13:02:17.650879 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-23T13:02:17.652098367Z I0223 13:02:17.650888 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652105957Z I0223 13:02:17.652097 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652113397Z I0223 13:02:17.650978 1 base_controller.go:181] Shutting down PodSecurityReadinessController ... 2026-02-23T13:02:17.652113397Z I0223 13:02:17.650978 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-02-23T13:02:17.652168489Z I0223 13:02:17.652121 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-02-23T13:02:17.652168489Z I0223 13:02:17.652138 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-02-23T13:02:17.652168489Z I0223 13:02:17.651073 1 base_controller.go:123] Shutting down worker of PodSecurityReadinessController controller ... 2026-02-23T13:02:17.652168489Z I0223 13:02:17.652155 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2026-02-23T13:02:17.652168489Z E0223 13:02:17.651134 1 base_controller.go:279] "Unhandled Error" err="webhookSupportabilityController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:17.652178869Z I0223 13:02:17.651149 1 base_controller.go:181] Shutting down kube-apiserver ... 2026-02-23T13:02:17.652178869Z I0223 13:02:17.651164 1 base_controller.go:123] Shutting down worker of kube-apiserver controller ... 2026-02-23T13:02:17.652201690Z I0223 13:02:17.652183 1 base_controller.go:113] All kube-apiserver workers have been terminated 2026-02-23T13:02:17.652201690Z I0223 13:02:17.651833 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-02-23T13:02:17.652210240Z I0223 13:02:17.651843 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-02-23T13:02:17.652221040Z I0223 13:02:17.651851 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-02-23T13:02:17.652221040Z I0223 13:02:17.651858 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-23T13:02:17.652228641Z I0223 13:02:17.651865 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-02-23T13:02:17.652235961Z I0223 13:02:17.651874 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652424256Z I0223 13:02:17.651881 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652455427Z I0223 13:02:17.651888 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652482388Z I0223 13:02:17.652472 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652502209Z I0223 13:02:17.651896 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-23T13:02:17.652528369Z I0223 13:02:17.652519 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-23T13:02:17.652559920Z I0223 13:02:17.652530 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.652559920Z I0223 13:02:17.650762 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-23T13:02:17.652568171Z I0223 13:02:17.650697 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-02-23T13:02:17.652592851Z I0223 13:02:17.652575 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-02-23T13:02:17.652600762Z I0223 13:02:17.652591 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-23T13:02:17.652613802Z I0223 13:02:17.652598 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-23T13:02:17.653774086Z W0223 13:02:17.653142 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-23T13:02:17.653774086Z W0223 13:02:17.653166 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-23T13:02:17.653774086Z W0223 13:02:17.653172 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-23T13:02:17.653774086Z I0223 13:02:17.653265 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-23T13:02:17.653774086Z I0223 13:02:17.653285 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-23T13:02:17.653774086Z I0223 13:02:17.653309 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-02-23T13:02:17.653774086Z I0223 13:02:17.653319 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-02-23T13:02:17.653774086Z I0223 13:02:17.653334 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-02-23T13:02:17.653774086Z I0223 13:02:17.653342 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-02-23T13:02:17.653774086Z E0223 13:02:17.653614 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-02-23T13:02:17.653949371Z W0223 13:02:17.653890 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-dgldn.json0000640000000000000000000001362415147050273030126 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-5d87bf58c-dgldn","generateName":"kube-apiserver-operator-5d87bf58c-","namespace":"openshift-kube-apiserver-operator","uid":"4a4b185e-17da-4711-a7b2-c2a9e1cd7b30","resourceVersion":"9060","creationTimestamp":"2026-02-23T12:59:07Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"5d87bf58c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-5d87bf58c","uid":"e0fd6a73-59fd-416d-ba43-7fa05a13b5d8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-23T13:02:18Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T13:01:02Z","finishedAt":"2026-02-23T13:02:17Z","containerID":"cri-o://fc76a6ebf82c376de367ae9069a978505805d785a26a3e42e6dad2867b699aeb"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","containerID":"cri-o://5746b4ef817cfb0913d62f6abec0cfefcc90fea76e17ad5446db2699e58dc8b7","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007420415147050273025205 0ustar00000000000000002026-02-23T13:02:31.705836681Z 2026-02-23T13:02:31.705836681Z cluster-etcd-operator rev \ 2026-02-23T13:02:31.705836681Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-23T13:02:31.705836681Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-23T13:02:31.705836681Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-23T13:02:31.705836681Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-23T13:02:31.705836681Z securityContext: 2026-02-23T13:02:31.705836681Z privileged: true 2026-02-23T13:02:31.705836681Z resources: 2026-02-23T13:02:31.705836681Z requests: 2026-02-23T13:02:31.705836681Z memory: 50Mi 2026-02-23T13:02:31.705836681Z cpu: 10m 2026-02-23T13:02:31.705836681Z env: 2026-02-23T13:02:31.705836681Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-23T13:02:31.705836681Z value: "https://192.168.32.10:2379" 2026-02-23T13:02:31.705836681Z - name: "ETCDCTL_API" 2026-02-23T13:02:31.705836681Z value: "3" 2026-02-23T13:02:31.705836681Z - name: "ETCDCTL_CACERT" 2026-02-23T13:02:31.705836681Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-23T13:02:31.705836681Z - name: "ETCDCTL_CERT" 2026-02-23T13:02:31.705836681Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-23T13:02:31.705836681Z - name: "ETCDCTL_ENDPOINTS" 2026-02-23T13:02:31.705836681Z value: "https://192.168.32.10:2379" 2026-02-23T13:02:31.705836681Z - name: "ETCDCTL_KEY" 2026-02-23T13:02:31.705836681Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-23T13:02:31.705836681Z - name: "ETCD_CIPHER_SUITES" 2026-02-23T13:02:31.705836681Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-23T13:02:31.705836681Z - name: "ETCD_DATA_DIR" 2026-02-23T13:02:31.705836681Z value: "/var/lib/etcd" 2026-02-23T13:02:31.705836681Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-23T13:02:31.705836681Z value: "2500" 2026-02-23T13:02:31.705836681Z - name: "ETCD_ENABLE_PPROF" 2026-02-23T13:02:31.705836681Z value: "true" 2026-02-23T13:02:31.705836681Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-23T13:02:31.705836681Z value: "1" 2026-02-23T13:02:31.705836681Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-23T13:02:31.705946874Z value: "200ms" 2026-02-23T13:02:31.705946874Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-23T13:02:31.705946874Z value: "5s" 2026-02-23T13:02:31.705946874Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-23T13:02:31.705946874Z value: "500" 2026-02-23T13:02:31.705946874Z - name: "ETCD_IMAGE" 2026-02-23T13:02:31.705946874Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef" 2026-02-23T13:02:31.705946874Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-23T13:02:31.705946874Z value: "existing" 2026-02-23T13:02:31.705946874Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-23T13:02:31.705946874Z value: "8589934592" 2026-02-23T13:02:31.705946874Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-23T13:02:31.705946874Z value: "true" 2026-02-23T13:02:31.705946874Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-23T13:02:31.705946874Z value: "TLS1.2" 2026-02-23T13:02:31.705946874Z - name: "NODE_master_0_ETCD_NAME" 2026-02-23T13:02:31.705946874Z value: "master-0" 2026-02-23T13:02:31.705946874Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-23T13:02:31.705946874Z value: "192.168.32.10" 2026-02-23T13:02:31.705946874Z - name: "NODE_master_0_IP" 2026-02-23T13:02:31.705946874Z value: "192.168.32.10" 2026-02-23T13:02:31.705946874Z volumeMounts: 2026-02-23T13:02:31.705946874Z - mountPath: /var/lib/etcd 2026-02-23T13:02:31.705946874Z name: data-dir 2026-02-23T13:02:31.705946874Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-23T13:02:31.705946874Z name: cert-dir 2026-02-23T13:02:31.705946874Z hostNetwork: true 2026-02-23T13:02:31.705946874Z priorityClassName: system-node-critical 2026-02-23T13:02:31.705946874Z tolerations: 2026-02-23T13:02:31.705946874Z - operator: "Exists" 2026-02-23T13:02:31.705946874Z volumes: 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /etc/kubernetes/manifests 2026-02-23T13:02:31.705946874Z name: static-pod-dir 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-23T13:02:31.705946874Z name: resource-dir 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-23T13:02:31.705946874Z name: cert-dir 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /var/lib/etcd 2026-02-23T13:02:31.705946874Z type: "" 2026-02-23T13:02:31.705946874Z name: data-dir 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /usr/local/bin 2026-02-23T13:02:31.705946874Z name: usr-local-bin 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /var/log/etcd 2026-02-23T13:02:31.705946874Z name: log-dir 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /etc/kubernetes 2026-02-23T13:02:31.705946874Z name: config-dir 2026-02-23T13:02:31.705946874Z - hostPath: 2026-02-23T13:02:31.705946874Z path: /var/lib/etcd-auto-backup 2026-02-23T13:02:31.705946874Z name: etcd-auto-backup-dir 2026-02-23T13:02:31.718171334Z I0223 13:02:31.718095 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-23T13:02:31.719496023Z I0223 13:02:31.719446 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-23T13:02:31.719496023Z I0223 13:02:31.719460 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-23T13:02:31.719496023Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-23T13:02:45.898348371Z W0223 13:02:45.897960 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.1896e1c7cfe603e3.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:05bbed42-d2a0-4d6c-a25f-0d75a37dbab0,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-02-23 13:02:31.719568355 +0000 UTC m=+31.058663324,LastTimestamp:2026-02-23 13:02:31.719568355 +0000 UTC m=+31.058663324,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) control-plane-machine-set-operator_current.log0000640000000000000000000001641015147050273040626 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-686847ff5f-rvz4w2026-02-23T13:05:40.913038383Z I0223 13:05:40.912853 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:05:40.913951576Z I0223 13:05:40.913907 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-23T13:05:40.922505863Z I0223 13:05:40.921679 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.1896e1f3dd37fa20 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2026-02-23 13:05:40.92160464 +0000 UTC m=+0.048614004,LastTimestamp:2026-02-23 13:05:40.92160464 +0000 UTC m=+0.048614004,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-02-23T13:05:40.922505863Z I0223 13:05:40.921709 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-23T13:05:40.922505863Z I0223 13:05:40.921873 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2026-02-23T13:05:40.922505863Z I0223 13:05:40.921902 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-02-23T13:05:40.922505863Z I0223 13:05:40.921954 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-02-23T13:05:40.922505863Z I0223 13:05:40.921989 1 main.go:230] "starting manager" logger="setup" 2026-02-23T13:05:40.922991846Z I0223 13:05:40.922946 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-23T13:05:40.923135949Z I0223 13:05:40.923085 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2026-02-23T13:05:40.923196961Z I0223 13:05:40.923171 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-23T13:05:40.923221241Z I0223 13:05:40.923202 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-02-23T13:05:40.923488038Z I0223 13:05:40.923386 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2026-02-23T13:05:40.924283788Z I0223 13:05:40.924235 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-02-23T13:05:40.924403692Z I0223 13:05:40.924349 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-02-23T13:05:40.924485574Z I0223 13:05:40.924455 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" control-plane-machine-set-operator_previous.log0000640000000000000000000003471615147050273041031 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-686847ff5f-rvz4w2026-02-23T13:02:24.802633282Z I0223 13:02:24.801993 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:02:24.804198058Z I0223 13:02:24.804140 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-23T13:02:24.816634164Z I0223 13:02:24.816512 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.1896e1c6346e5136 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2026-02-23 13:02:24.816288054 +0000 UTC m=+0.053597220,LastTimestamp:2026-02-23 13:02:24.816288054 +0000 UTC m=+0.053597220,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-02-23T13:02:24.816697636Z I0223 13:02:24.816612 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-23T13:02:24.817146009Z I0223 13:02:24.817004 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2026-02-23T13:02:24.817146009Z I0223 13:02:24.817097 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-02-23T13:02:24.817286683Z I0223 13:02:24.817218 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-02-23T13:02:24.817387416Z I0223 13:02:24.817361 1 main.go:230] "starting manager" logger="setup" 2026-02-23T13:02:24.817758227Z I0223 13:02:24.817710 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-23T13:02:24.817872020Z I0223 13:02:24.817845 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-23T13:02:24.818029515Z I0223 13:02:24.817995 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-02-23T13:02:24.818208460Z I0223 13:02:24.818169 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2026-02-23T13:02:24.818327074Z I0223 13:02:24.817988 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2026-02-23T13:02:24.818774607Z I0223 13:02:24.818728 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-02-23T13:02:24.818996114Z I0223 13:02:24.818955 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2026-02-23T13:02:24.819152698Z I0223 13:02:24.819107 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-02-23T13:02:24.829346178Z I0223 13:02:24.825802 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/control-plane-machine-set-leader 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826200 1 recorder.go:104] "control-plane-machine-set-operator-686847ff5f-rvz4w_e7c2b6a3-3759-41a7-99e7-d6b7436bfa0e became leader" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-machine-api","name":"control-plane-machine-set-leader","uid":"67af59ab-a0bf-4756-bd86-c2ee982f315b","apiVersion":"coordination.k8s.io/v1","resourceVersion":"9217"} reason="LeaderElection" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826435 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ControlPlaneMachineSet" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826456 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1beta1.Machine" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826468 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Node" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826480 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ClusterOperator" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826491 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Infrastructure" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.826501 1 controller.go:183] "Starting Controller" controller="controlplanemachineset" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.827398 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1.ControlPlaneMachineSet" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.827417 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1beta1.Machine" 2026-02-23T13:02:24.829346178Z I0223 13:02:24.827429 1 controller.go:183] "Starting Controller" controller="controlplanemachinesetgenerator" 2026-02-23T13:02:25.006621461Z I0223 13:02:25.006555 1 controller.go:217] "Starting workers" controller="controlplanemachinesetgenerator" worker count=1 2026-02-23T13:02:25.006707553Z I0223 13:02:25.006663 1 controller.go:217] "Starting workers" controller="controlplanemachineset" worker count=1 2026-02-23T13:02:25.006834517Z I0223 13:02:25.006740 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="de52c73d-e083-46f2-91e6-292e1e45237e" namespace="openshift-machine-api" name="cluster" 2026-02-23T13:02:25.006848437Z I0223 13:02:25.006834 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="de52c73d-e083-46f2-91e6-292e1e45237e" namespace="openshift-machine-api" name="cluster" 2026-02-23T13:02:25.016009227Z I0223 13:02:25.015957 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="de52c73d-e083-46f2-91e6-292e1e45237e" namespace="openshift-machine-api" name="cluster" 2026-02-23T13:02:25.016033398Z I0223 13:02:25.016009 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="2c4b1c5a-7c87-4411-add4-9b223e119b22" namespace="openshift-machine-api" name="cluster" 2026-02-23T13:02:25.016065459Z I0223 13:02:25.016044 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="2c4b1c5a-7c87-4411-add4-9b223e119b22" namespace="openshift-machine-api" name="cluster" 2026-02-23T13:02:25.016093630Z I0223 13:02:25.016071 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="2c4b1c5a-7c87-4411-add4-9b223e119b22" namespace="openshift-machine-api" name="cluster" 2026-02-23T13:03:24.839444135Z E0223 13:03:24.839342 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-23T13:04:24.841560933Z E0223 13:04:24.841445 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader) 2026-02-23T13:04:37.832746707Z I0223 13:04:37.832604 1 leaderelection.go:297] failed to renew lease openshift-machine-api/control-plane-machine-set-leader: timed out waiting for the condition 2026-02-23T13:05:11.840264483Z E0223 13:05:11.840149 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-23T13:05:11.840582181Z I0223 13:05:11.840530 1 recorder.go:104] "control-plane-machine-set-operator-686847ff5f-rvz4w_e7c2b6a3-3759-41a7-99e7-d6b7436bfa0e stopped leading" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-machine-api","name":"control-plane-machine-set-leader","uid":"67af59ab-a0bf-4756-bd86-c2ee982f315b","apiVersion":"coordination.k8s.io/v1","resourceVersion":"9218"} reason="LeaderElection" 2026-02-23T13:05:11.840620622Z I0223 13:05:11.840573 1 internal.go:538] "Stopping and waiting for non leader election runnables" 2026-02-23T13:05:11.840670063Z I0223 13:05:11.840654 1 internal.go:542] "Stopping and waiting for leader election runnables" 2026-02-23T13:05:11.840728795Z I0223 13:05:11.840714 1 internal.go:550] "Stopping and waiting for caches" 2026-02-23T13:05:11.840771326Z I0223 13:05:11.840758 1 internal.go:554] "Stopping and waiting for webhooks" 2026-02-23T13:05:11.840809787Z I0223 13:05:11.840797 1 internal.go:557] "Stopping and waiting for HTTP servers" 2026-02-23T13:05:11.840845778Z I0223 13:05:11.840833 1 internal.go:561] "Wait completed, proceeding to shutdown the manager" 2026-02-23T13:05:11.840877798Z I0223 13:05:11.840767 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="controlplanemachineset" 2026-02-23T13:05:11.840924740Z I0223 13:05:11.840909 1 controller.go:239] "All workers finished" controller="controlplanemachineset" 2026-02-23T13:05:11.840965481Z I0223 13:05:11.840796 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="controlplanemachinesetgenerator" 2026-02-23T13:05:11.841001982Z I0223 13:05:11.840987 1 controller.go:239] "All workers finished" controller="controlplanemachinesetgenerator" 2026-02-23T13:05:11.841065053Z I0223 13:05:11.841047 1 server.go:254] "Shutting down metrics server with timeout of 1 minute" logger="controller-runtime.metrics" 2026-02-23T13:05:11.841139605Z E0223 13:05:11.841082 1 main.go:233] "problem running manager" err="leader election lost" logger="setup" 2026-02-23T13:05:11.841139605Z I0223 13:05:11.841120 1 server.go:68] "shutting down server" name="health probe" addr="[::]:8081" config/pod/openshift-machine-api/control-plane-machine-set-operator-686847ff5f-rvz4w.json0000640000000000000000000002000515147050273027561 0ustar0000000000000000{"metadata":{"name":"control-plane-machine-set-operator-686847ff5f-rvz4w","generateName":"control-plane-machine-set-operator-686847ff5f-","namespace":"openshift-machine-api","uid":"4bc22782-a369-48aa-a0e8-c1c63ffa3053","resourceVersion":"9670","creationTimestamp":"2026-02-23T13:02:21Z","labels":{"k8s-app":"control-plane-machine-set-operator","pod-template-hash":"686847ff5f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.53/23\"],\"mac_address\":\"0a:58:0a:80:00:35\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.53/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.53\"\n ],\n \"mac\": \"0a:58:0a:80:00:35\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"control-plane-machine-set-operator-686847ff5f","uid":"ae5d0e36-7d35-439a-89ae-139bf9c58ca7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"control-plane-machine-set-operator-tls","secret":{"secretName":"control-plane-machine-set-operator-tls","defaultMode":420}},{"name":"kube-api-access-265wg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"control-plane-machine-set-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","command":["/manager"],"args":["-v=2","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-machine-api"],"ports":[{"name":"https","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-265wg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000490000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"control-plane-machine-set-operator","serviceAccount":"control-plane-machine-set-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"fsGroup":1000490000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"control-plane-machine-set-operator-dockercfg-sxjzf"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:25Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.53","podIPs":[{"ip":"10.128.0.53"}],"startTime":"2026-02-23T13:02:21Z","containerStatuses":[{"name":"control-plane-machine-set-operator","state":{"running":{"startedAt":"2026-02-23T13:05:40Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":" out waiting for the condition\nE0223 13:05:11.840149 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nI0223 13:05:11.840530 1 recorder.go:104] \"control-plane-machine-set-operator-686847ff5f-rvz4w_e7c2b6a3-3759-41a7-99e7-d6b7436bfa0e stopped leading\" logger=\"events\" type=\"Normal\" object={\"kind\":\"Lease\",\"namespace\":\"openshift-machine-api\",\"name\":\"control-plane-machine-set-leader\",\"uid\":\"67af59ab-a0bf-4756-bd86-c2ee982f315b\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"9218\"} reason=\"LeaderElection\"\nI0223 13:05:11.840573 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\nI0223 13:05:11.840654 1 internal.go:542] \"Stopping and waiting for leader election runnables\"\nI0223 13:05:11.840714 1 internal.go:550] \"Stopping and waiting for caches\"\nI0223 13:05:11.840758 1 internal.go:554] \"Stopping and waiting for webhooks\"\nI0223 13:05:11.840797 1 internal.go:557] \"Stopping and waiting for HTTP servers\"\nI0223 13:05:11.840833 1 internal.go:561] \"Wait completed, proceeding to shutdown the manager\"\nI0223 13:05:11.840767 1 controller.go:237] \"Shutdown signal received, waiting for all workers to finish\" controller=\"controlplanemachineset\"\nI0223 13:05:11.840909 1 controller.go:239] \"All workers finished\" controller=\"controlplanemachineset\"\nI0223 13:05:11.840796 1 controller.go:237] \"Shutdown signal received, waiting for all workers to finish\" controller=\"controlplanemachinesetgenerator\"\nI0223 13:05:11.840987 1 controller.go:239] \"All workers finished\" controller=\"controlplanemachinesetgenerator\"\nI0223 13:05:11.841047 1 server.go:254] \"Shutting down metrics server with timeout of 1 minute\" logger=\"controller-runtime.metrics\"\nE0223 13:05:11.841082 1 main.go:233] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0223 13:05:11.841120 1 server.go:68] \"shutting down server\" name=\"health probe\" addr=\"[::]:8081\"\n","startedAt":"2026-02-23T13:02:24Z","finishedAt":"2026-02-23T13:05:11Z","containerID":"cri-o://0a361025f0f0b4dd3a2d9d3bc39a5bc567c08f5ded2a78f736405795214ce703"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","containerID":"cri-o://9e38aa42b3fe61c9c1cf925b3c085230297f114549a309d0dbbb04d8b9cb3c23","started":true,"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-265wg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}baremetal-kube-rbac-proxy_current.log0000640000000000000000000001552515147050273035361 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-d6bb9bb76-8mxs22026-02-23T13:02:33.955397979Z I0223 13:02:33.955024 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955184 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955191 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955194 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955197 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955201 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955204 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955207 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955211 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955214 1 flags.go:64] FLAG: --config-file="/etc/baremetal-kube-rbac-proxy/config-file.yaml" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955217 1 flags.go:64] FLAG: --help="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955220 1 flags.go:64] FLAG: --http2-disable="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955222 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955226 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955229 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955287 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955291 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955295 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955299 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955303 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955306 1 flags.go:64] FLAG: --log-dir="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955309 1 flags.go:64] FLAG: --log-file="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955312 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955319 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955323 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955326 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955328 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955331 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955334 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955336 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955339 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955344 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955347 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955350 1 flags.go:64] FLAG: --one-output="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955353 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955355 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955358 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955361 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955363 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955367 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955370 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955377 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955380 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955383 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-23T13:02:33.955397979Z I0223 13:02:33.955387 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955390 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955394 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955397 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955399 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955402 1 flags.go:64] FLAG: --v="10" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955405 1 flags.go:64] FLAG: --version="false" 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955409 1 flags.go:64] FLAG: --vmodule="" 2026-02-23T13:02:33.955637536Z W0223 13:02:33.955415 1 deprecated.go:66] 2026-02-23T13:02:33.955637536Z ==== Removed Flag Warning ====================== 2026-02-23T13:02:33.955637536Z 2026-02-23T13:02:33.955637536Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T13:02:33.955637536Z 2026-02-23T13:02:33.955637536Z =============================================== 2026-02-23T13:02:33.955637536Z 2026-02-23T13:02:33.955637536Z I0223 13:02:33.955425 1 kube-rbac-proxy.go:530] Reading config file: /etc/baremetal-kube-rbac-proxy/config-file.yaml 2026-02-23T13:02:33.956314096Z I0223 13:02:33.956035 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T13:02:33.957481420Z I0223 13:02:33.957454 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T13:02:33.957550972Z I0223 13:02:33.957531 1 reloader.go:99] reloading key /etc/tls/private/tls.key certificate /etc/tls/private/tls.crt 2026-02-23T13:02:33.957988005Z I0223 13:02:33.957932 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-23T13:02:33.958616594Z I0223 13:02:33.958592 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 cluster-baremetal-operator_current.log0000640000000000000000000000045215147050273035652 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-d6bb9bb76-8mxs22026-02-23T13:05:44.707779836Z E0223 13:05:44.705989 1 main.go:144] "unable to get enabled features" err="unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)" cluster-baremetal-operator_previous.log0000640000000000000000000000015615147050273036045 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-d6bb9bb76-8mxs2unable to retrieve container logs for cri-o://bf33ebd3a7c944a8b2b4f5b2612fb746b9e2aa4db28f34044a8146fe08ba01dfconfig/pod/openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2.json0000640000000000000000000002214615147050273026153 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-d6bb9bb76-8mxs2","generateName":"cluster-baremetal-operator-d6bb9bb76-","namespace":"openshift-machine-api","uid":"16898873-740b-4b85-99cf-d25a28d4ab00","resourceVersion":"9903","creationTimestamp":"2026-02-23T13:02:29Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"d6bb9bb76"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.56/23\"],\"mac_address\":\"0a:58:0a:80:00:38\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.56/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.56\"\n ],\n \"mac\": \"0a:58:0a:80:00:38\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-d6bb9bb76","uid":"cef2c358-b4ab-46e7-b8da-2ba7a02ae459","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-xhmk8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-xhmk8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-xhmk8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"runAsUser":65534,"runAsNonRoot":true},"imagePullSecrets":[{"name":"cluster-baremetal-operator-dockercfg-4q8qn"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:34Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:29Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:44Z","reason":"ContainersNotReady","message":"containers with unready status: [cluster-baremetal-operator]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:44Z","reason":"ContainersNotReady","message":"containers with unready status: [cluster-baremetal-operator]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:29Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.56","podIPs":[{"ip":"10.128.0.56"}],"startTime":"2026-02-23T13:02:29Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-23T13:02:33Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://a3a1e9eb43281abf59115cccbf31f8f12085bcc8375b2e8193cc6ce9106717fd","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-xhmk8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"terminated":{"exitCode":1,"reason":"Error","message":"E0223 13:05:44.705989 1 main.go:144] \"unable to get enabled features\" err=\"unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"\n","startedAt":"2026-02-23T13:04:44Z","finishedAt":"2026-02-23T13:05:44Z","containerID":"cri-o://65c1fff907a886de0c20ba50f90af4df31705ea1e7b38b4684f430c20bbd2c46"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"E0223 13:03:33.806305 1 main.go:144] \"unable to get enabled features\" err=\"unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"\n","startedAt":"2026-02-23T13:02:33Z","finishedAt":"2026-02-23T13:03:33Z","containerID":"cri-o://bf33ebd3a7c944a8b2b4f5b2612fb746b9e2aa4db28f34044a8146fe08ba01df"}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","containerID":"cri-o://65c1fff907a886de0c20ba50f90af4df31705ea1e7b38b4684f430c20bbd2c46","started":false,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-xhmk8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-autoscaler-operator_current.log0000640000000000000000000003144515147050273036104 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-86b8dc6d6-6b92p2026-02-23T13:02:34.444696433Z I0223 13:02:34.444466 1 main.go:15] Go Version: go1.22.12 (Red Hat 1.22.12-3.el9_5) X:strictfipsruntime 2026-02-23T13:02:34.444696433Z I0223 13:02:34.444594 1 main.go:16] Go OS/Arch: linux/amd64 2026-02-23T13:02:34.444696433Z I0223 13:02:34.444598 1 main.go:17] Version: cluster-autoscaler-operator v4.18.0-202601302238.p2.g474ad65.assembly.stream.el9+ose-cluster-autoscaler-operator 2026-02-23T13:02:34.444868498Z I0223 13:02:34.444814 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:03:34.458196646Z W0223 13:03:34.458034 1 leaderelection.go:51] unable to get cluster infrastructure status, using HA cluster values for leader election: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster) 2026-02-23T13:03:34.463724746Z I0223 13:03:34.463647 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-clusterautoscalers" 2026-02-23T13:03:34.463854590Z I0223 13:03:34.463765 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-machineautoscalers" 2026-02-23T13:03:34.464110108Z I0223 13:03:34.464047 1 main.go:41] Starting cluster-autoscaler-operator 2026-02-23T13:03:34.464478158Z I0223 13:03:34.464375 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-02-23T13:03:34.464739396Z I0223 13:03:34.464663 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-02-23T13:03:34.464879970Z I0223 13:03:34.464828 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/cluster-autoscaler-operator-leader... 2026-02-23T13:03:34.464945922Z I0223 13:03:34.464914 1 server.go:247] "msg"="Serving metrics server" "bindAddress"="127.0.0.1:9191" "logger"="controller-runtime.metrics" "secure"=false 2026-02-23T13:03:34.465406695Z I0223 13:03:34.465317 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-02-23T13:03:34.465961031Z I0223 13:03:34.465901 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=8443 2026-02-23T13:03:34.465983182Z I0223 13:03:34.465957 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-02-23T13:04:34.467585295Z E0223 13:04:34.467528 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/cluster-autoscaler-operator-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-autoscaler-operator-leader) 2026-02-23T13:05:22.196973551Z I0223 13:05:22.196911 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/cluster-autoscaler-operator-leader 2026-02-23T13:05:22.197834443Z I0223 13:05:22.197815 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ClusterAutoscaler" 2026-02-23T13:05:22.198280074Z I0223 13:05:22.198262 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Deployment" 2026-02-23T13:05:22.198405847Z I0223 13:05:22.198393 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Service" 2026-02-23T13:05:22.198451059Z I0223 13:05:22.198434 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ServiceMonitor" 2026-02-23T13:05:22.198508670Z I0223 13:05:22.198498 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.PrometheusRule" 2026-02-23T13:05:22.198554321Z I0223 13:05:22.198537 1 controller.go:183] "msg"="Starting Controller" "controller"="cluster_autoscaler_controller" 2026-02-23T13:05:22.198605193Z I0223 13:05:22.198568 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *v1beta1.MachineAutoscaler" 2026-02-23T13:05:22.198635083Z I0223 13:05:22.198164 1 status.go:341] Starting status reporter: cluster operator informers 2026-02-23T13:05:22.198701855Z I0223 13:05:22.198627 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *unstructured.Unstructured" 2026-02-23T13:05:22.198749266Z I0223 13:05:22.198738 1 controller.go:183] "msg"="Starting Controller" "controller"="machine_autoscaler_controller" 2026-02-23T13:05:22.299871662Z I0223 13:05:22.299803 1 status.go:352] Starting status reporter: worker 2026-02-23T13:05:22.315769965Z I0223 13:05:22.315728 1 controller.go:217] "msg"="Starting workers" "controller"="machine_autoscaler_controller" "worker count"=1 2026-02-23T13:05:22.325293777Z I0223 13:05:22.325259 1 controller.go:217] "msg"="Starting workers" "controller"="cluster_autoscaler_controller" "worker count"=1 2026-02-23T13:05:36.814798490Z I0223 13:05:36.814682 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:36.814798490Z W0223 13:05:36.814720 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:36.838401769Z I0223 13:05:36.838312 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:36.838401769Z W0223 13:05:36.838337 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:36.880357604Z I0223 13:05:36.880273 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:36.880357604Z W0223 13:05:36.880290 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:36.886162741Z I0223 13:05:36.886077 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:36.886162741Z W0223 13:05:36.886090 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:36.898527945Z I0223 13:05:36.898423 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:36.898527945Z W0223 13:05:36.898457 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:37.305686715Z I0223 13:05:37.305575 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:37.305686715Z W0223 13:05:37.305597 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:37.864731019Z I0223 13:05:37.864625 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:37.864731019Z W0223 13:05:37.864654 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:40.019609574Z I0223 13:05:40.019536 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:40.019609574Z W0223 13:05:40.019573 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:40.352299966Z I0223 13:05:40.350642 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:40.352299966Z W0223 13:05:40.350663 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:40.445373097Z I0223 13:05:40.443913 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:40.445373097Z W0223 13:05:40.443937 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:40.503303877Z I0223 13:05:40.500069 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:40.503303877Z W0223 13:05:40.500091 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:40.841800976Z I0223 13:05:40.841741 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:40.841800976Z W0223 13:05:40.841759 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:41.871297666Z I0223 13:05:41.867640 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:41.871297666Z W0223 13:05:41.869700 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.460316133Z I0223 13:05:46.460107 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.460316133Z W0223 13:05:46.460131 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.580356068Z I0223 13:05:46.580297 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.580356068Z W0223 13:05:46.580319 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.588198667Z I0223 13:05:46.586843 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.588198667Z W0223 13:05:46.586855 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.613262903Z I0223 13:05:46.612542 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.613262903Z W0223 13:05:46.612559 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.643549752Z I0223 13:05:46.643480 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.643549752Z W0223 13:05:46.643502 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.786728445Z I0223 13:05:46.786646 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.786728445Z W0223 13:05:46.786674 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.848977794Z I0223 13:05:46.848894 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.848977794Z W0223 13:05:46.848928 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:46.870388477Z I0223 13:05:46.870291 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:46.870388477Z W0223 13:05:46.870338 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:47.057306900Z I0223 13:05:47.053521 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:47.057306900Z W0223 13:05:47.053548 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:47.225295122Z I0223 13:05:47.225201 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:47.225295122Z W0223 13:05:47.225268 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:47.623540327Z I0223 13:05:47.623437 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:47.623540327Z W0223 13:05:47.623459 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:48.791553202Z I0223 13:05:48.791411 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:48.791553202Z W0223 13:05:48.791473 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:49.042471359Z I0223 13:05:49.042376 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:49.042471359Z W0223 13:05:49.042410 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:49.517997705Z I0223 13:05:49.517883 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:49.517997705Z W0223 13:05:49.517918 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:51.762775201Z I0223 13:05:51.762698 1 webhookconfig.go:72] Webhook configuration status: created 2026-02-23T13:05:51.802276814Z I0223 13:05:51.801752 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:51.802276814Z W0223 13:05:51.801775 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:52.084431263Z I0223 13:05:52.084336 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:52.084431263Z W0223 13:05:52.084364 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:52.237833045Z I0223 13:05:52.237747 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:52.237833045Z W0223 13:05:52.237775 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:52.303832449Z I0223 13:05:52.303756 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:52.303832449Z W0223 13:05:52.303784 1 status.go:271] Operator status degraded: machine-api not ready 2026-02-23T13:05:54.778179821Z I0223 13:05:54.778098 1 status.go:437] machine-api-operator not ready yet 2026-02-23T13:05:54.778179821Z W0223 13:05:54.778121 1 status.go:271] Operator status degraded: machine-api not ready kube-rbac-proxy_current.log0000640000000000000000000001524715147050273033446 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-86b8dc6d6-6b92p2026-02-23T13:02:31.876674722Z I0223 13:02:31.876472 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876625 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876632 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876636 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876640 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876645 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876653 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876656 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876659 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876662 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-02-23T13:02:31.876674722Z I0223 13:02:31.876666 1 flags.go:64] FLAG: --help="false" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876669 1 flags.go:64] FLAG: --http2-disable="false" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876674 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876678 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876682 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876686 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876689 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876692 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876697 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876699 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876702 1 flags.go:64] FLAG: --log-dir="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876705 1 flags.go:64] FLAG: --log-file="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876707 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876711 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876714 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876717 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876720 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876729 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876732 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876735 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876738 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876742 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876745 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876748 1 flags.go:64] FLAG: --one-output="false" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876750 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876753 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:9192" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876756 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876759 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876762 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876765 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876768 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876776 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-23T13:02:31.876812066Z I0223 13:02:31.876779 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876782 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876823 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:9191/" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876827 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876830 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876832 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876835 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876838 1 flags.go:64] FLAG: --v="3" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876841 1 flags.go:64] FLAG: --version="false" 2026-02-23T13:02:31.876864018Z I0223 13:02:31.876845 1 flags.go:64] FLAG: --vmodule="" 2026-02-23T13:02:31.876864018Z W0223 13:02:31.876856 1 deprecated.go:66] 2026-02-23T13:02:31.876864018Z ==== Removed Flag Warning ====================== 2026-02-23T13:02:31.876864018Z 2026-02-23T13:02:31.876864018Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T13:02:31.876864018Z 2026-02-23T13:02:31.876864018Z =============================================== 2026-02-23T13:02:31.876864018Z 2026-02-23T13:02:31.876877778Z I0223 13:02:31.876867 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-23T13:02:31.879427313Z I0223 13:02:31.878903 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T13:02:31.880437213Z I0223 13:02:31.880398 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T13:02:31.880896387Z I0223 13:02:31.880774 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9192 2026-02-23T13:02:31.881128694Z I0223 13:02:31.881097 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9192 config/pod/openshift-oauth-apiserver/logs/apiserver-5ddfd84bb7-vhg7p/oauth-apiserver_current.log0000640000000000000000000011505215147050273031525 0ustar00000000000000002026-02-23T13:04:10.031598146Z E0223 13:04:10.031446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:10.037643741Z E0223 13:04:10.037562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:10.044810259Z E0223 13:04:10.044712 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:10.063344857Z E0223 13:04:10.063224 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:10.063464880Z E0223 13:04:10.063426 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:10.541899204Z W0223 13:04:10.541714 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:15.936947917Z E0223 13:04:15.934436 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.946444263Z E0223 13:04:15.946368 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.946799663Z E0223 13:04:15.946751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.946987789Z E0223 13:04:15.946928 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.947017589Z E0223 13:04:15.946751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.978625916Z E0223 13:04:15.978546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.978727159Z E0223 13:04:15.978677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.978727159Z E0223 13:04:15.978685 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.978846672Z E0223 13:04:15.978790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:15.978919374Z E0223 13:04:15.978893 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:16.599074738Z W0223 13:04:16.598932 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:16.907687897Z W0223 13:04:16.907553 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:23.281131443Z W0223 13:04:23.280990 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:24.680944265Z W0223 13:04:24.680859 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:29.209884254Z W0223 13:04:29.209776 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:30.798496060Z W0223 13:04:30.798374 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:33.095882059Z W0223 13:04:33.095763 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:33.995097054Z W0223 13:04:33.994971 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:35.040233901Z W0223 13:04:35.040100 1 logging.go:55] [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:40.078601183Z E0223 13:04:40.078473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.079281133Z E0223 13:04:40.079195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.079754167Z E0223 13:04:40.079695 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.080195829Z E0223 13:04:40.080136 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.080610171Z E0223 13:04:40.080536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.080917520Z E0223 13:04:40.080860 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.081216989Z E0223 13:04:40.081172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.081658042Z E0223 13:04:40.081562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.081775625Z E0223 13:04:40.081569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:40.081799856Z E0223 13:04:40.081778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:42.596195837Z W0223 13:04:42.596084 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:43.597531313Z W0223 13:04:43.597434 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:44.944185823Z W0223 13:04:44.944068 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:45.927328652Z E0223 13:04:45.925618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.927328652Z E0223 13:04:45.925928 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.927328652Z E0223 13:04:45.926382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.927328652Z E0223 13:04:45.926492 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.927328652Z E0223 13:04:45.926840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.965579172Z E0223 13:04:45.963070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.965579172Z E0223 13:04:45.963696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.965579172Z E0223 13:04:45.964040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.965579172Z E0223 13:04:45.964391 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:45.965579172Z E0223 13:04:45.964836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:46.019442054Z E0223 13:04:46.019357 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:46.034946023Z E0223 13:04:46.034876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:46.035391776Z E0223 13:04:46.035339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:46.046934081Z E0223 13:04:46.046862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:04:47.464002053Z W0223 13:04:47.463883 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:51.296723297Z W0223 13:04:51.296634 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:04:58.659282079Z W0223 13:04:58.659092 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T13:05:10.085568451Z E0223 13:05:10.085480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.085568451Z E0223 13:05:10.085529 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.085628732Z E0223 13:05:10.085574 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.085704744Z E0223 13:05:10.085662 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.085727455Z E0223 13:05:10.085686 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.085776356Z E0223 13:05:10.085480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.086003912Z E0223 13:05:10.085953 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.086016412Z E0223 13:05:10.085997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.086074244Z E0223 13:05:10.086045 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:10.086312610Z E0223 13:05:10.086195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:15.941675808Z E0223 13:05:15.941573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:15.941755180Z E0223 13:05:15.941659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:15.942408037Z E0223 13:05:15.942343 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:15.948589353Z E0223 13:05:15.948525 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:15.948589353Z E0223 13:05:15.948547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:16.978204857Z E0223 13:05:16.978144 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:16.978345650Z E0223 13:05:16.978307 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:16.978760511Z E0223 13:05:16.978724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:16.978940635Z E0223 13:05:16.978924 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:16.979073879Z E0223 13:05:16.979043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.089536698Z E0223 13:05:40.089409 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.089536698Z E0223 13:05:40.089454 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.089842036Z E0223 13:05:40.089776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.089842036Z E0223 13:05:40.089792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.090476582Z E0223 13:05:40.090407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.097089500Z E0223 13:05:40.097030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.097449269Z E0223 13:05:40.097374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.102196360Z E0223 13:05:40.102152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.103060362Z E0223 13:05:40.103022 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:40.103473922Z E0223 13:05:40.103381 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.939812256Z E0223 13:05:45.939692 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.946952407Z E0223 13:05:45.946917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.947267865Z E0223 13:05:45.947219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.947367077Z E0223 13:05:45.947324 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.960074470Z E0223 13:05:45.960025 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.960393198Z E0223 13:05:45.960357 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.960549152Z E0223 13:05:45.960525 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.960763557Z E0223 13:05:45.960687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.960851710Z E0223 13:05:45.960826 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.961094246Z E0223 13:05:45.961068 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:45.964305517Z http2: server: error reading preface from client 10.128.0.2:34216: read tcp 10.128.0.38:8443->10.128.0.2:34216: read: connection reset by peer 2026-02-23T13:05:46.062475378Z E0223 13:05:46.062408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.062661963Z E0223 13:05:46.062610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.071951419Z E0223 13:05:46.071892 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" 2026-02-23T13:05:46.072066251Z E0223 13:05:46.072041 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2916699882202560272, SKID=E2:56:E0:78:1F:AC:3F:7B:22:1F:E7:66:AC:E0:26:FB:B1:A0:F4:74, AKID=08:67:AC:39:EF:3F:B5:0A:88:7C:A2:6A:44:27:DA:15:BD:35:32:80 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-7b65dc9fcb-v92vx.json0000640000000000000000000001534115147050273023333 0ustar0000000000000000{"metadata":{"name":"router-default-7b65dc9fcb-v92vx","generateName":"router-default-7b65dc9fcb-","namespace":"openshift-ingress","uid":"8994f73c-03b7-480e-b527-78a1f2fd8b3c","resourceVersion":"6782","creationTimestamp":"2026-02-23T13:01:53Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"6b694f4697","pod-template-hash":"7b65dc9fcb"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7b65dc9fcb","uid":"a5fc51a6-f30a-4a58-8b73-c3d684c3617d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-5fth9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-5fth9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["6b694f4697"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:53Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062415147050273037344 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-ld4gj2026-02-23T13:05:40.588973711Z Copying system trust bundle 2026-02-23T13:05:40.690035545Z W0223 13:05:40.687877 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-23T13:05:40.690035545Z I0223 13:05:40.688173 1 observer_polling.go:159] Starting file observer 2026-02-23T13:05:40.690035545Z I0223 13:05:40.688867 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T13:05:40.690035545Z I0223 13:05:40.688902 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:05:40.691692837Z I0223 13:05:40.690132 1 observer_polling.go:159] Starting file observer 2026-02-23T13:05:40.713218633Z I0223 13:05:40.711661 1 builder.go:304] cluster-authentication-operator version - 2026-02-23T13:05:40.713218633Z I0223 13:05:40.712558 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T13:05:41.212316007Z I0223 13:05:41.212222 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-23T13:05:41.219667043Z I0223 13:05:41.219609 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-23T13:05:41.219667043Z I0223 13:05:41.219640 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-23T13:05:41.220113695Z I0223 13:05:41.219976 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-23T13:05:41.220213987Z I0223 13:05:41.220177 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-23T13:05:41.224586268Z I0223 13:05:41.224543 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T13:05:41.224586268Z W0223 13:05:41.224561 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:41.224586268Z W0223 13:05:41.224565 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T13:05:41.224586268Z W0223 13:05:41.224570 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T13:05:41.224586268Z I0223 13:05:41.224566 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-23T13:05:41.224586268Z W0223 13:05:41.224572 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T13:05:41.224630319Z W0223 13:05:41.224584 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T13:05:41.224630319Z W0223 13:05:41.224588 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T13:05:41.227954323Z I0223 13:05:41.227910 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T13:05:41.227954323Z I0223 13:05:41.227944 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T13:05:41.228013705Z I0223 13:05:41.227981 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T13:05:41.228013705Z I0223 13:05:41.227975 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T13:05:41.228045606Z I0223 13:05:41.228019 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:41.228079627Z I0223 13:05:41.227997 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:41.228182479Z I0223 13:05:41.228153 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T13:05:41.228182479Z I0223 13:05:41.228166 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T13:05:41.228420165Z I0223 13:05:41.228311 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771851680\" (2026-02-23 13:01:22 +0000 UTC to 2028-02-23 13:01:23 +0000 UTC (now=2026-02-23 13:05:41.228279572 +0000 UTC))" 2026-02-23T13:05:41.228741453Z I0223 13:05:41.228474 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851941\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851940\" (2026-02-23 12:05:40 +0000 UTC to 2027-02-23 12:05:40 +0000 UTC (now=2026-02-23 13:05:41.228453336 +0000 UTC))" 2026-02-23T13:05:41.228741453Z I0223 13:05:41.228501 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T13:05:41.228741453Z I0223 13:05:41.228518 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-23T13:05:41.228741453Z I0223 13:05:41.228513 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T13:05:41.228741453Z I0223 13:05:41.228532 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T13:05:41.231443172Z I0223 13:05:41.230999 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-23T13:05:41.231443172Z I0223 13:05:41.231434 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-23T13:05:41.232044947Z I0223 13:05:41.232011 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-23T13:05:41.329194902Z I0223 13:05:41.329103 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T13:05:41.329194902Z I0223 13:05:41.329113 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T13:05:41.329327946Z I0223 13:05:41.329275 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T13:05:41.329456079Z I0223 13:05:41.329418 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 12:50:50 +0000 UTC to 2026-02-24 12:50:50 +0000 UTC (now=2026-02-23 13:05:41.329386367 +0000 UTC))" 2026-02-23T13:05:41.329599773Z I0223 13:05:41.329574 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771851680\" (2026-02-23 13:01:22 +0000 UTC to 2028-02-23 13:01:23 +0000 UTC (now=2026-02-23 13:05:41.329560402 +0000 UTC))" 2026-02-23T13:05:41.329699675Z I0223 13:05:41.329675 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851941\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851940\" (2026-02-23 12:05:40 +0000 UTC to 2027-02-23 12:05:40 +0000 UTC (now=2026-02-23 13:05:41.329663864 +0000 UTC))" 2026-02-23T13:05:41.329844199Z I0223 13:05:41.329817 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 12:43:50 +0000 UTC to 2036-02-21 12:43:50 +0000 UTC (now=2026-02-23 13:05:41.329805058 +0000 UTC))" 2026-02-23T13:05:41.329844199Z I0223 13:05:41.329837 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2026-02-24 12:50:52 +0000 UTC (now=2026-02-23 13:05:41.329829168 +0000 UTC))" 2026-02-23T13:05:41.329865899Z I0223 13:05:41.329851 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2027-02-23 12:50:52 +0000 UTC (now=2026-02-23 13:05:41.329841979 +0000 UTC))" 2026-02-23T13:05:41.329873459Z I0223 13:05:41.329866 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-23 12:50:52 +0000 UTC to 2027-02-23 12:50:52 +0000 UTC (now=2026-02-23 13:05:41.329856879 +0000 UTC))" 2026-02-23T13:05:41.329900490Z I0223 13:05:41.329878 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 12:50:49 +0000 UTC to 2036-02-21 12:50:49 +0000 UTC (now=2026-02-23 13:05:41.329870329 +0000 UTC))" 2026-02-23T13:05:41.329900490Z I0223 13:05:41.329894 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 12:50:50 +0000 UTC to 2026-02-24 12:50:50 +0000 UTC (now=2026-02-23 13:05:41.3298868 +0000 UTC))" 2026-02-23T13:05:41.330015423Z I0223 13:05:41.329987 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771851680\" (2026-02-23 13:01:22 +0000 UTC to 2028-02-23 13:01:23 +0000 UTC (now=2026-02-23 13:05:41.329977122 +0000 UTC))" 2026-02-23T13:05:41.330110115Z I0223 13:05:41.330086 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771851941\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771851940\" (2026-02-23 12:05:40 +0000 UTC to 2027-02-23 12:05:40 +0000 UTC (now=2026-02-23 13:05:41.330076605 +0000 UTC))" 2026-02-23T13:05:46.370528124Z I0223 13:05:46.370408 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T13:05:46.370906994Z I0223 13:05:46.370844 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... authentication-operator_previous.log0000640000000000000000000000336315147050273037536 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-ld4gj2026-02-23T13:03:36.382155022Z Copying system trust bundle 2026-02-23T13:03:36.471089524Z W0223 13:03:36.470978 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-23T13:03:36.472217896Z I0223 13:03:36.472099 1 observer_polling.go:159] Starting file observer 2026-02-23T13:03:36.473495243Z I0223 13:03:36.473445 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T13:03:36.473618777Z I0223 13:03:36.473516 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T13:03:36.475565943Z I0223 13:03:36.475520 1 observer_polling.go:159] Starting file observer 2026-02-23T13:04:36.487452668Z W0223 13:04:36.487365 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-5bd7c86784-ld4gj) 2026-02-23T13:04:36.487593052Z I0223 13:04:36.487566 1 builder.go:304] cluster-authentication-operator version - 2026-02-23T13:04:36.488876939Z I0223 13:04:36.488831 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T13:05:07.006391267Z F0223 13:05:07.006235 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock": context deadline exceeded config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-ld4gj.json0000640000000000000000000002103015147050273030224 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5bd7c86784-ld4gj","generateName":"authentication-operator-5bd7c86784-","namespace":"openshift-authentication-operator","uid":"f5400b52-ab9c-4bc3-8ea5-80fb3e1b37f8","resourceVersion":"9661","creationTimestamp":"2026-02-23T12:59:08Z","labels":{"app":"authentication-operator","pod-template-hash":"5bd7c86784"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5bd7c86784","uid":"42dd366f-717f-43be-bb57-df303fad25fb","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-gr6rg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.33_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-gr6rg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c4"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-23T13:05:40Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0223 13:03:36.470978 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0223 13:03:36.472099 1 observer_polling.go:159] Starting file observer\nI0223 13:03:36.473445 1 cmd.go:253] Using service-serving-cert provided certificates\nI0223 13:03:36.473516 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0223 13:03:36.475520 1 observer_polling.go:159] Starting file observer\nW0223 13:04:36.487365 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-5bd7c86784-ld4gj)\nI0223 13:04:36.487566 1 builder.go:304] cluster-authentication-operator version -\nI0223 13:04:36.488831 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0223 13:05:07.006235 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-23T13:03:36Z","finishedAt":"2026-02-23T13:05:07Z","containerID":"cri-o://548c2b6ddec877e25587f0b887e8188520ed011da1cb3c86a39995da4b475367"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","containerID":"cri-o://28759b105ef16fc9766c38f67df6c142da73e18661733246b760f77ad371c2c7","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-gr6rg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003154215147050273020645 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:55:26Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:55:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c75f78c8b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:55:39Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:55:40Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5499d7f7bb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:55:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5499d7f7bb to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:59:04Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:59:05Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:59:05Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5499d7f7bb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:59:07Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5499d7f7bb-g9x74","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T12:59:08Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c75f78c8b-8tzms","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:00:00Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29530860-9f5kd","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:00:00Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29530860","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:40Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:40Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:40Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 11.823s (11.823s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 12.365s (12.365s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:53Z","reason":"LeaderElection","message":"package-server-manager-5c75f78c8b-8tzms_7d283795-1409-490f-9c3b-d4a9e90e3979 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:01:57Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:02:31Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-596f79dd6f to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:02:31Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-596f79dd6f-mjhwm","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:03:32Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_catalog-operator-596f79dd6f-mjhwm_openshift-operator-lifecycle-manager_d91fa6bb-0c88-4930-884a-67e840d58a9f_0(4ddc09240d0be35bebbb338d160c9a10839d97eccb352288c60fa143dd1fa342): error adding pod openshift-operator-lifecycle-manager_catalog-operator-596f79dd6f-mjhwm to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"4ddc09240d0be35bebbb338d160c9a10839d97eccb352288c60fa143dd1fa342\" Netns:\"/var/run/netns/112a21fa-3fe1-462b-8632-993a6c8eb398\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=catalog-operator-596f79dd6f-mjhwm;K8S_POD_INFRA_CONTAINER_ID=4ddc09240d0be35bebbb338d160c9a10839d97eccb352288c60fa143dd1fa342;K8S_POD_UID=d91fa6bb-0c88-4930-884a-67e840d58a9f\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-mjhwm] networking: Multus: [openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-mjhwm/d91fa6bb-0c88-4930-884a-67e840d58a9f]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod catalog-operator-596f79dd6f-mjhwm in out of cluster comm: SetNetworkStatus: failed to update the pod catalog-operator-596f79dd6f-mjhwm in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/catalog-operator-596f79dd6f-mjhwm?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:04:33Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_catalog-operator-596f79dd6f-mjhwm_openshift-operator-lifecycle-manager_d91fa6bb-0c88-4930-884a-67e840d58a9f_0(f8b26ba2d0cfb6f502868ce62dc420c1786726d54cec962fd50b897883eceafa): error adding pod openshift-operator-lifecycle-manager_catalog-operator-596f79dd6f-mjhwm to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"f8b26ba2d0cfb6f502868ce62dc420c1786726d54cec962fd50b897883eceafa\" Netns:\"/var/run/netns/f09f72da-0687-40a6-927d-2b5d6e145238\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=catalog-operator-596f79dd6f-mjhwm;K8S_POD_INFRA_CONTAINER_ID=f8b26ba2d0cfb6f502868ce62dc420c1786726d54cec962fd50b897883eceafa;K8S_POD_UID=d91fa6bb-0c88-4930-884a-67e840d58a9f\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-mjhwm] networking: Multus: [openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-mjhwm/d91fa6bb-0c88-4930-884a-67e840d58a9f]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod catalog-operator-596f79dd6f-mjhwm in out of cluster comm: SetNetworkStatus: failed to update the pod catalog-operator-596f79dd6f-mjhwm in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/catalog-operator-596f79dd6f-mjhwm?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:04:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T13:05:50Z","reason":"NoPods","message":"No matching pods found","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001161015147050273015437 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:30Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-568db89b47-fbwml","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-568db89b47 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:34Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:34Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:35Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6dcf85cb46-cmf75","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:35Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-568db89b47-fbwml","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6dcf85cb46 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-568db89b47 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" in 13.594s (13.594s including waiting). Image size: 589275174 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:53Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:53Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T13:01:58Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000010150615147050273017274 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T12:55:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-8586dccc9b to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T12:55:34Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T12:59:06Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T12:59:08Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-8586dccc9b-6wk86","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\" in 8.429s (8.429s including waiting). Image size: 512172666 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"LeaderElection","message":"openshift-apiserver-operator-8586dccc9b-6wk86_cba672a1-c3f1-4dee-a1d8-5d076ae4ffd8 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:28Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:30Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:01:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"openshift-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:02:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\" already present on machine","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000010533515147050273020202 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T12:55:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-77cd4d9559 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T12:55:33Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T12:59:05Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T12:59:07Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-77cd4d9559-j97h8","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" in 8.466s (8.466s including waiting). Image size: 506291135 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-77cd4d9559-j97h8_faa79bcc-0a3d-4c18-b895-a7bb6680c2ad became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:36Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:50Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:51Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:52Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:52Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:00Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:00Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:01Z","reason":"StartingNewRevision","message":"new revision 5 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:06Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"SecretCreated","message":"Created Secret/serving-cert-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:10Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:12Z","reason":"RevisionTriggered","message":"new revision 5 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:02:17Z","reason":"PodCreated","message":"Created Pod/installer-5-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000001070615147050273016346 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:38Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:38Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:45Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:01:58Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:01Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:04Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:07Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:07Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:15Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:19Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-23T13:02:19Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000015166615147050273022027 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T12:55:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-7bcfbc574b to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T12:55:33Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-7bcfbc574b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T12:59:05Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-7bcfbc574b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T12:59:07Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-7bcfbc574b-jpf5n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.18/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" in 9.637s (9.637s including waiting). Image size: 508786786 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"LeaderElection","message":"kube-controller-manager-operator-7bcfbc574b-jpf5n_f8722a7b-ba47-4337-b53c-78c7b4a247ed became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-42q98\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-42q98\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:47Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:49Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:50Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:51Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:52Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:52Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:52Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:53Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:56Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.18:44911-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.18:44911-\u003e172.30.0.10:53: read: connection refused\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:05Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:06Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:08Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:14Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:14Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:15Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:26Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:26Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:27Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:28Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:28Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:28Z","reason":"SecretCreateFailed","message":"Failed to create Secret/localhost-recovery-client-token-3 -n openshift-kube-controller-manager: client rate limiter Wait returned an error: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:29Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:02:29Z","reason":"LeaderElection","message":"kube-controller-manager-operator-7bcfbc574b-jpf5n_cca48b9a-4b4f-435f-aec4-6cf0ddd621da became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:25Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:33Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:33Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\" to \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\\nTargetConfigControllerDegraded: \\\"configmap\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/cluster-policy-controller-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\\nTargetConfigControllerDegraded: \\\"configmap/recycler-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\\nTargetConfigControllerDegraded: \\\"configmap\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/cluster-policy-controller-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\\nTargetConfigControllerDegraded: \\\"configmap/recycler-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps recycler-config)\" to \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\" to \"NodeControllerDegraded: All master nodes are ready\\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-23T13:05:50Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000342615147050273020164 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:01:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:13Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:17Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-23T13:02:17Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215147050273016364 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-23T13:02:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-23T13:02:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-23T13:02:05Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-23T13:02:05Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000032076415147050273020231 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T12:55:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-5d87bf58c to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T12:55:40Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T12:59:05Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T12:59:07Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-5d87bf58c-dgldn","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:02Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:02Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:03Z","reason":"LeaderElection","message":"kube-apiserver-operator-5d87bf58c-dgldn_73db95e1-96c3-4c7e-9e96-1b09de8fee6d became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:03Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:03Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:03Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:04Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:08Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:09Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:09Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:09Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:09Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:09Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:10Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:10Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:11Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:11Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:11Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:12Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:13Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:13Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:13Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:14Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:14Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:15Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:15Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:15Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:16Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:35Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:38Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:41Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:51Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:53Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:55Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:01Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:04Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:17Z","reason":"InstallerPodFailed","message":"Failed to create installer pod for revision 1 count 0 on node \"master-0\": client rate limiter Wait returned an error: context canceled","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:18Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:18Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:19Z","reason":"LeaderElection","message":"kube-apiserver-operator-5d87bf58c-dgldn_0bfff357-ebc0-4f66-a75e-4b8eaced5e86 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:19Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:02:20Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeControllerDegraded: All master nodes are ready\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:46Z","reason":"InstallerPodFailed","message":"installer errors: installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\nI0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0223 13:02:06.253235 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0223 13:02:06.315392 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\nF0223 13:02:50.325769 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\\nKubeAPIServerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T13:05:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\\nKubeAPIServerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0223 13:02:06.232299 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253154 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0223 13:02:06.253235 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.315392 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0223 13:02:06.321007 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0223 13:02:36.321683 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0223 13:02:50.325769 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-apiserver-recovery)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io apirequestcounts.apiserver.openshift.io)\\nKubeAPIServerStaticResourcesDegraded: \"","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615147050273014364 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:01:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:31Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:45Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:45Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:58Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:58Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:02:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:03:12Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:03:12Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:03:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T13:04:58Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004015515147050273016215 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T12:55:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-545bf96f4d to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T12:55:35Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T12:59:06Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T12:59:09Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-545bf96f4d-drk2j","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:01Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" in 9.318s (9.318s including waiting). Image size: 518279996 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"LeaderElection","message":"etcd-operator-545bf96f4d-drk2j_c3982d1d-3a3c-45e1-b0ca-5bb3bb6901b6 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:26Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:40Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:44Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:45Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:01:50Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:04:29Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:04:29Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-machine-api.json0000640000000000000000000001506415147050273015621 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set control-plane-machine-set-operator-686847ff5f to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:21Z","reason":"SuccessfulCreate","message":"Created pod: control-plane-machine-set-operator-686847ff5f-rvz4w","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:24Z","reason":"LeaderElection","message":"control-plane-machine-set-operator-686847ff5f-rvz4w_e7c2b6a3-3759-41a7-99e7-d6b7436bfa0e became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:24Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\" in 2.002s (2.002s including waiting). Image size: 470575802 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-baremetal-operator-d6bb9bb76 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:29Z","reason":"SuccessfulCreate","message":"Created pod: cluster-baremetal-operator-d6bb9bb76-8mxs2","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:30Z","reason":"SuccessfulCreate","message":"Created pod: cluster-autoscaler-operator-86b8dc6d6-6b92p","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:30Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.56/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-autoscaler-operator-86b8dc6d6 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:31Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:33Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\" in 2.826s (2.826s including waiting). Image size: 470717179 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:33Z","reason":"Started","message":"Started container baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:33Z","reason":"Created","message":"Created container: baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:34Z","reason":"Started","message":"Started container cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:34Z","reason":"Created","message":"Created container: cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:02:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6\" in 2.429s (2.429s including waiting). Image size: 456273550 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Started","message":"Started container cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Created","message":"Created container: cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:04:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:05:22Z","reason":"LeaderElection","message":"cluster-autoscaler-operator-86b8dc6d6-6b92p_88b45e5d-86b4-469f-81c6-0ce827a916a8 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Created","message":"Created container: control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Started","message":"Started container control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T13:05:44Z","reason":"BackOff","message":"Back-off restarting failed container cluster-baremetal-operator in pod cluster-baremetal-operator-d6bb9bb76-8mxs2_openshift-machine-api(16898873-740b-4b85-99cf-d25a28d4ab00)","type":"Warning"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000410615147050273016557 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:01:43Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5ddfd84bb7-vhg7p","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:01:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5ddfd84bb7 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:01:52Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" in 7.939s (7.939s including waiting). Image size: 505244089 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:02:00Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:02:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:02:02Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T13:02:02Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000056015147050273015113 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-23T13:01:53Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7b65dc9fcb-v92vx","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-23T13:01:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7b65dc9fcb to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000023721415147050273020321 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T12:55:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5bd7c86784 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T12:55:37Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T12:59:06Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T12:59:08Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5bd7c86784-ld4gj","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" in 9.593s (9.593s including waiting). Image size: 513119434 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"LeaderElection","message":"authentication-operator-5bd7c86784-ld4gj_58fb9a04-2f89-4e39-94f6-5c9aae4b39e8 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:20Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:21Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-n9kc8\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:23Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-n9kc8\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:28Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:28Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:29Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:33Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:36Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:37Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:39Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:58Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:01:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:11Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"oauth-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:02:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.67:443/healthz\\\": dial tcp 172.30.139.67:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:03:08Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:03:08Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T13:05:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" already present on machine","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015147050273016274 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-23T13:01:56Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-23T13:01:58Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003436215147050266014616 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":332,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-operator","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015147050265014100 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/featuregate.json0000640000000000000000000000613615147050260013702 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"66665210-ab4f-4253-acff-84f5e7e2dfbf","resourceVersion":"650","generation":1,"creationTimestamp":"2026-02-23T12:55:00Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.33","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115147050260025274 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"2192adc2-2074-4303-b781-f105a3de3f71","resourceVersion":"4907","generation":2,"creationTimestamp":"2026-02-23T12:55:34Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515147050260026733 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"0875e001-63b8-486c-a55d-2d4bedca6746","resourceVersion":"6886","generation":1,"creationTimestamp":"2026-02-23T13:01:56Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"895c304b-4f58-4ee5-88db-48f2e2f1d40c","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715147050260024021 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"8137cb2f-0354-4c7d-b16e-6735865d3263","resourceVersion":"4902","generation":2,"creationTimestamp":"2026-02-23T12:59:59Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"895c304b-4f58-4ee5-88db-48f2e2f1d40c","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000000253315147050260024774 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"8f75a015-bc0c-44e1-87d8-d06f346d3168","resourceVersion":"10033","generation":1,"creationTimestamp":"2026-02-23T13:05:22Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443}},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443}},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/node/logs/master-0.log0000640000000000000000000011525315147050257014546 0ustar0000000000000000Feb 23 13:04:34.733779 master-0 kubenswrapper[7845]: E0223 13:04:34.733608 7845 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[auth-proxy-config kube-api-access-kpbtg], unattached volumes=[], failed to process volumes=[]: context deadline exceeded" pod="openshift-machine-config-operator/machine-config-operator-7f8c75f984-82h6s" podUID="c33f208a-e158-47e2-83d5-ac792bf3a1d5" Feb 23 13:04:35.511747 master-0 kubenswrapper[7845]: E0223 13:04:35.511532 7845 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="6.4s" Feb 23 13:04:39.258651 master-0 kubenswrapper[7845]: I0223 13:04:39.258532 7845 patch_prober.go:28] interesting pod/marketplace-operator-6f5488b997-28zcz container/marketplace-operator namespace/openshift-marketplace: Liveness probe status=failure output="Get \"http://10.128.0.6:8080/healthz\": dial tcp 10.128.0.6:8080: connect: connection refused" start-of-body= Feb 23 13:04:39.258651 master-0 kubenswrapper[7845]: I0223 13:04:39.258648 7845 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-marketplace/marketplace-operator-6f5488b997-28zcz" podUID="1d953c37-1b74-4ce5-89cb-b3f53454fc57" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.6:8080/healthz\": dial tcp 10.128.0.6:8080: connect: connection refused" Feb 23 13:04:39.259719 master-0 kubenswrapper[7845]: I0223 13:04:39.258678 7845 patch_prober.go:28] interesting pod/marketplace-operator-6f5488b997-28zcz container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.6:8080/healthz\": dial tcp 10.128.0.6:8080: connect: connection refused" start-of-body= Feb 23 13:04:39.259719 master-0 kubenswrapper[7845]: I0223 13:04:39.258775 7845 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-6f5488b997-28zcz" podUID="1d953c37-1b74-4ce5-89cb-b3f53454fc57" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.6:8080/healthz\": dial tcp 10.128.0.6:8080: connect: connection refused" Feb 23 13:04:39.743302 master-0 kubenswrapper[7845]: I0223 13:04:39.743105 7845 patch_prober.go:28] interesting pod/catalogd-controller-manager-84b8d9d697-bckd6 container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.34:8081/readyz\": dial tcp 10.128.0.34:8081: connect: connection refused" start-of-body= Feb 23 13:04:39.743302 master-0 kubenswrapper[7845]: I0223 13:04:39.743145 7845 patch_prober.go:28] interesting pod/catalogd-controller-manager-84b8d9d697-bckd6 container/manager namespace/openshift-catalogd: Liveness probe status=failure output="Get \"http://10.128.0.34:8081/healthz\": dial tcp 10.128.0.34:8081: connect: connection refused" start-of-body= Feb 23 13:04:39.743795 master-0 kubenswrapper[7845]: I0223 13:04:39.743305 7845 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-bckd6" podUID="bfbb4d6d-7047-48cb-be03-97a57fc688e3" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.34:8081/readyz\": dial tcp 10.128.0.34:8081: connect: connection refused" Feb 23 13:04:39.743795 master-0 kubenswrapper[7845]: I0223 13:04:39.743389 7845 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-bckd6" podUID="bfbb4d6d-7047-48cb-be03-97a57fc688e3" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.34:8081/healthz\": dial tcp 10.128.0.34:8081: connect: connection refused" Feb 23 13:04:39.801087 master-0 kubenswrapper[7845]: E0223 13:04:39.800906 7845 configmap.go:193] Couldn't get configMap openshift-machine-config-operator/kube-rbac-proxy: configmap "kube-rbac-proxy" not found Feb 23 13:04:39.801087 master-0 kubenswrapper[7845]: E0223 13:04:39.801064 7845 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/c33f208a-e158-47e2-83d5-ac792bf3a1d5-auth-proxy-config podName:c33f208a-e158-47e2-83d5-ac792bf3a1d5 nodeName:}" failed. No retries permitted until 2026-02-23 13:06:41.801023934 +0000 UTC m=+335.796754845 (durationBeforeRetry 2m2s). Error: MountVolume.SetUp failed for volume "auth-proxy-config" (UniqueName: "kubernetes.io/configmap/c33f208a-e158-47e2-83d5-ac792bf3a1d5-auth-proxy-config") pod "machine-config-operator-7f8c75f984-82h6s" (UID: "c33f208a-e158-47e2-83d5-ac792bf3a1d5") : configmap "kube-rbac-proxy" not found Feb 23 13:04:44.254054 master-0 kubenswrapper[7845]: E0223 13:04:44.253894 7845 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Feb 23 13:04:44.254436 master-0 kubenswrapper[7845]: E0223 13:04:44.254182 7845 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.017s" Feb 23 13:04:47.774070 master-0 kubenswrapper[7845]: E0223 13:04:47.773869 7845 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{machine-config-operator-7f8c75f984-82h6s.1896e1c7daa05352 openshift-machine-config-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-machine-config-operator,Name:machine-config-operator-7f8c75f984-82h6s,UID:c33f208a-e158-47e2-83d5-ac792bf3a1d5,APIVersion:v1,ResourceVersion:9547,FieldPath:,},Reason:FailedMount,Message:MountVolume.SetUp failed for volume \"auth-proxy-config\" : configmap \"kube-rbac-proxy\" not found,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-02-23 13:02:31.899550546 +0000 UTC m=+85.895281417,LastTimestamp:2026-02-23 13:02:31.899550546 +0000 UTC m=+85.895281417,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Feb 23 13:04:48.862876 master-0 kubenswrapper[7845]: E0223 13:04:48.862583 7845 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:04:38Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:04:38Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:04:38Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:04:38Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd\\\"],\\\"sizeBytes\\\":1637274270},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd\\\"],\\\"sizeBytes\\\":1237794314},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf\\\"],\\\"sizeBytes\\\":992461126},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274\\\"],\\\"sizeBytes\\\":943734757},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed\\\"],\\\"sizeBytes\\\":880247193},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021\\\"],\\\"sizeBytes\\\":875998518},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\\\"],\\\"sizeBytes\\\":862501144},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c3fa84eaa1310d97fe55bb23a7c27ece85718d0643fa7fc0ff81014edb4b948b\\\"],\\\"sizeBytes\\\":772838975},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd420e879c9f0271bca2d123a6d762591d9a4626b72f254d1f885842c32149e8\\\"],\\\"sizeBytes\\\":687849728},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e\\\"],\\\"sizeBytes\\\":682963466},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2\\\"],\\\"sizeBytes\\\":677827184},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83\\\"],\\\"sizeBytes\\\":621542709},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\\\"],\\\"sizeBytes\\\":589275174},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9\\\"],\\\"sizeBytes\\\":582052489},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74\\\"],\\\"sizeBytes\\\":558105176},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721\\\"],\\\"sizeBytes\\\":548646306},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\\\"],\\\"sizeBytes\\\":529218694},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec\\\"],\\\"sizeBytes\\\":528829499},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\\\"],\\\"sizeBytes\\\":518279996},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\\\"],\\\"sizeBytes\\\":517888569},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\\\"],\\\"sizeBytes\\\":514875199},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\\\"],\\\"sizeBytes\\\":513119434},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\\\"],\\\"sizeBytes\\\":512172666},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3\\\"],\\\"sizeBytes\\\":511125422},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7\\\"],\\\"sizeBytes\\\":511059399},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\\\"],\\\"sizeBytes\\\":508786786},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83\\\"],\\\"sizeBytes\\\":508443359},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896\\\"],\\\"sizeBytes\\\":507867630},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e\\\"],\\\"sizeBytes\\\":506374680},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\\\"],\\\"sizeBytes\\\":506291135},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\\\"],\\\"sizeBytes\\\":505244089},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95\\\"],\\\"sizeBytes\\\":505137106},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc\\\"],\\\"sizeBytes\\\":504513960},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c\\\"],\\\"sizeBytes\\\":495888162},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b\\\"],\\\"sizeBytes\\\":494959854},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655\\\"],\\\"sizeBytes\\\":486990304},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c\\\"],\\\"sizeBytes\\\":484349508},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd\\\"],\\\"sizeBytes\\\":484074784},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\\\"],\\\"sizeBytes\\\":470717179},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\\\"],\\\"sizeBytes\\\":470575802},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3\\\"],\\\"sizeBytes\\\":468159025},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa\\\"],\\\"sizeBytes\\\":467133839},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\\\"],\\\"sizeBytes\\\":464984427},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9\\\"],\\\"sizeBytes\\\":463600445},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656\\\"],\\\"sizeBytes\\\":458025547},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf\\\"],\\\"sizeBytes\\\":456470711},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6\\\"],\\\"sizeBytes\\\":456273550},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6\\\"],\\\"sizeBytes\\\":455311777},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de\\\"],\\\"sizeBytes\\\":448723134},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\\\"],\\\"sizeBytes\\\":447940744}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 23 13:04:51.501233 master-0 kubenswrapper[7845]: E0223 13:04:51.501116 7845 projected.go:194] Error preparing data for projected volume kube-api-access-kpbtg for pod openshift-machine-config-operator/machine-config-operator-7f8c75f984-82h6s: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Feb 23 13:04:51.502217 master-0 kubenswrapper[7845]: E0223 13:04:51.501357 7845 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c33f208a-e158-47e2-83d5-ac792bf3a1d5-kube-api-access-kpbtg podName:c33f208a-e158-47e2-83d5-ac792bf3a1d5 nodeName:}" failed. No retries permitted until 2026-02-23 13:04:55.501223287 +0000 UTC m=+229.496954348 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "kube-api-access-kpbtg" (UniqueName: "kubernetes.io/projected/c33f208a-e158-47e2-83d5-ac792bf3a1d5-kube-api-access-kpbtg") pod "machine-config-operator-7f8c75f984-82h6s" (UID: "c33f208a-e158-47e2-83d5-ac792bf3a1d5") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Feb 23 13:04:51.913292 master-0 kubenswrapper[7845]: E0223 13:04:51.913027 7845 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Feb 23 13:04:57.267186 master-0 kubenswrapper[7845]: E0223 13:04:57.267083 7845 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Feb 23 13:04:58.864130 master-0 kubenswrapper[7845]: E0223 13:04:58.864060 7845 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 23 13:05:08.865229 master-0 kubenswrapper[7845]: E0223 13:05:08.864982 7845 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 23 13:05:08.914926 master-0 kubenswrapper[7845]: E0223 13:05:08.914835 7845 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Feb 23 13:05:10.633059 master-0 kubenswrapper[7845]: I0223 13:05:10.632967 7845 patch_prober.go:28] interesting pod/controller-manager-59947b7887-xg2ln container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" start-of-body= Feb 23 13:05:10.633998 master-0 kubenswrapper[7845]: I0223 13:05:10.633094 7845 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" podUID="18b48459-51ad-4b0d-8608-4ba6d3fa8e16" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" Feb 23 13:05:10.633998 master-0 kubenswrapper[7845]: I0223 13:05:10.633150 7845 patch_prober.go:28] interesting pod/controller-manager-59947b7887-xg2ln container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" start-of-body= Feb 23 13:05:10.633998 master-0 kubenswrapper[7845]: I0223 13:05:10.633436 7845 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" podUID="18b48459-51ad-4b0d-8608-4ba6d3fa8e16" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" Feb 23 13:05:18.272292 master-0 kubenswrapper[7845]: E0223 13:05:18.272168 7845 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Feb 23 13:05:18.272609 master-0 kubenswrapper[7845]: E0223 13:05:18.272546 7845 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.017s" Feb 23 13:05:18.865620 master-0 kubenswrapper[7845]: E0223 13:05:18.865579 7845 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 23 13:05:20.632813 master-0 kubenswrapper[7845]: I0223 13:05:20.632724 7845 patch_prober.go:28] interesting pod/controller-manager-59947b7887-xg2ln container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" start-of-body= Feb 23 13:05:20.632813 master-0 kubenswrapper[7845]: I0223 13:05:20.632798 7845 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" podUID="18b48459-51ad-4b0d-8608-4ba6d3fa8e16" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" Feb 23 13:05:20.633773 master-0 kubenswrapper[7845]: I0223 13:05:20.632814 7845 patch_prober.go:28] interesting pod/controller-manager-59947b7887-xg2ln container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" start-of-body= Feb 23 13:05:20.633773 master-0 kubenswrapper[7845]: I0223 13:05:20.632902 7845 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" podUID="18b48459-51ad-4b0d-8608-4ba6d3fa8e16" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" Feb 23 13:05:21.777911 master-0 kubenswrapper[7845]: E0223 13:05:21.777725 7845 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{machine-config-operator-7f8c75f984-82h6s.1896e1c7daa05352 openshift-machine-config-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-machine-config-operator,Name:machine-config-operator-7f8c75f984-82h6s,UID:c33f208a-e158-47e2-83d5-ac792bf3a1d5,APIVersion:v1,ResourceVersion:9547,FieldPath:,},Reason:FailedMount,Message:MountVolume.SetUp failed for volume \"auth-proxy-config\" : configmap \"kube-rbac-proxy\" not found,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-02-23 13:02:31.899550546 +0000 UTC m=+85.895281417,LastTimestamp:2026-02-23 13:02:32.405975965 +0000 UTC m=+86.401706836,Count:2,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Feb 23 13:05:28.867599 master-0 kubenswrapper[7845]: E0223 13:05:28.867400 7845 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": the server was unable to return a response in the time allotted, but may still be processing the request (get nodes master-0)" Feb 23 13:05:28.867599 master-0 kubenswrapper[7845]: E0223 13:05:28.867458 7845 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Feb 23 13:05:29.542185 master-0 kubenswrapper[7845]: E0223 13:05:29.541993 7845 projected.go:194] Error preparing data for projected volume kube-api-access-kpbtg for pod openshift-machine-config-operator/machine-config-operator-7f8c75f984-82h6s: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Feb 23 13:05:29.542185 master-0 kubenswrapper[7845]: E0223 13:05:29.542143 7845 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c33f208a-e158-47e2-83d5-ac792bf3a1d5-kube-api-access-kpbtg podName:c33f208a-e158-47e2-83d5-ac792bf3a1d5 nodeName:}" failed. No retries permitted until 2026-02-23 13:05:37.542105284 +0000 UTC m=+271.537836185 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "kube-api-access-kpbtg" (UniqueName: "kubernetes.io/projected/c33f208a-e158-47e2-83d5-ac792bf3a1d5-kube-api-access-kpbtg") pod "machine-config-operator-7f8c75f984-82h6s" (UID: "c33f208a-e158-47e2-83d5-ac792bf3a1d5") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Feb 23 13:05:30.633139 master-0 kubenswrapper[7845]: I0223 13:05:30.633015 7845 patch_prober.go:28] interesting pod/controller-manager-59947b7887-xg2ln container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" start-of-body= Feb 23 13:05:30.633139 master-0 kubenswrapper[7845]: I0223 13:05:30.633039 7845 patch_prober.go:28] interesting pod/controller-manager-59947b7887-xg2ln container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" start-of-body= Feb 23 13:05:30.634216 master-0 kubenswrapper[7845]: I0223 13:05:30.633234 7845 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" podUID="18b48459-51ad-4b0d-8608-4ba6d3fa8e16" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" Feb 23 13:05:30.634216 master-0 kubenswrapper[7845]: I0223 13:05:30.633118 7845 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-59947b7887-xg2ln" podUID="18b48459-51ad-4b0d-8608-4ba6d3fa8e16" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused" Feb 23 13:05:40.315210 master-0 kubenswrapper[7845]: E0223 13:05:40.314962 7845 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="22.042s" Feb 23 13:05:40.826956 master-0 kubenswrapper[7845]: E0223 13:05:40.826901 7845 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"c65806bbb72797b16ca1cc7fb12f55df7a4437f40a45f61de78d10a426366d4c\": container with ID starting with c65806bbb72797b16ca1cc7fb12f55df7a4437f40a45f61de78d10a426366d4c not found: ID does not exist" containerID="c65806bbb72797b16ca1cc7fb12f55df7a4437f40a45f61de78d10a426366d4c" Feb 23 13:05:40.833054 master-0 kubenswrapper[7845]: E0223 13:05:40.832961 7845 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f851ec87a4036c52a57197cffc73e94324fe1b28d700748ce2cbe7e609946b62\": container with ID starting with f851ec87a4036c52a57197cffc73e94324fe1b28d700748ce2cbe7e609946b62 not found: ID does not exist" containerID="f851ec87a4036c52a57197cffc73e94324fe1b28d700748ce2cbe7e609946b62" Feb 23 13:05:40.845526 master-0 kubenswrapper[7845]: E0223 13:05:40.845472 7845 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"9434b984208094abfa32d0434e0b6c07ffebc8320b7283d7504e2a0ebf047ea6\": container with ID starting with 9434b984208094abfa32d0434e0b6c07ffebc8320b7283d7504e2a0ebf047ea6 not found: ID does not exist" containerID="9434b984208094abfa32d0434e0b6c07ffebc8320b7283d7504e2a0ebf047ea6" Feb 23 13:05:44.267696 master-0 kubenswrapper[7845]: E0223 13:05:44.267640 7845 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" is forbidden: the server was unable to return a response in the time allotted, but may still be processing the request (get limitranges)" pod="openshift-etcd/etcd-master-0" Feb 23 13:05:44.939581 master-0 kubenswrapper[7845]: E0223 13:05:44.939547 7845 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"cluster-baremetal-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=cluster-baremetal-operator pod=cluster-baremetal-operator-d6bb9bb76-8mxs2_openshift-machine-api(16898873-740b-4b85-99cf-d25a28d4ab00)\"" pod="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-8mxs2" podUID="16898873-740b-4b85-99cf-d25a28d4ab00" Feb 23 13:05:49.043622 master-0 kubenswrapper[7845]: E0223 13:05:49.043328 7845 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:05:39Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:05:39Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:05:39Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-23T13:05:39Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd\\\"],\\\"sizeBytes\\\":1637274270},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd\\\"],\\\"sizeBytes\\\":1237794314},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf\\\"],\\\"sizeBytes\\\":992461126},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274\\\"],\\\"sizeBytes\\\":943734757},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed\\\"],\\\"sizeBytes\\\":880247193},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021\\\"],\\\"sizeBytes\\\":875998518},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\\\"],\\\"sizeBytes\\\":862501144},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c3fa84eaa1310d97fe55bb23a7c27ece85718d0643fa7fc0ff81014edb4b948b\\\"],\\\"sizeBytes\\\":772838975},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd420e879c9f0271bca2d123a6d762591d9a4626b72f254d1f885842c32149e8\\\"],\\\"sizeBytes\\\":687849728},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e\\\"],\\\"sizeBytes\\\":682963466},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2\\\"],\\\"sizeBytes\\\":677827184},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83\\\"],\\\"sizeBytes\\\":621542709},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\\\"],\\\"sizeBytes\\\":589275174},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9\\\"],\\\"sizeBytes\\\":582052489},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74\\\"],\\\"sizeBytes\\\":558105176},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721\\\"],\\\"sizeBytes\\\":548646306},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\\\"],\\\"sizeBytes\\\":529218694},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec\\\"],\\\"sizeBytes\\\":528829499},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\\\"],\\\"sizeBytes\\\":518279996},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\\\"],\\\"sizeBytes\\\":517888569},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\\\"],\\\"sizeBytes\\\":514875199},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\\\"],\\\"sizeBytes\\\":513119434},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\\\"],\\\"sizeBytes\\\":512172666},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3\\\"],\\\"sizeBytes\\\":511125422},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7\\\"],\\\"sizeBytes\\\":511059399},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\\\"],\\\"sizeBytes\\\":508786786},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83\\\"],\\\"sizeBytes\\\":508443359},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896\\\"],\\\"sizeBytes\\\":507867630},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e\\\"],\\\"sizeBytes\\\":506374680},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\\\"],\\\"sizeBytes\\\":506291135},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\\\"],\\\"sizeBytes\\\":505244089},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95\\\"],\\\"sizeBytes\\\":505137106},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc\\\"],\\\"sizeBytes\\\":504513960},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c\\\"],\\\"sizeBytes\\\":495888162},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b\\\"],\\\"sizeBytes\\\":494959854},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655\\\"],\\\"sizeBytes\\\":486990304},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c\\\"],\\\"sizeBytes\\\":484349508},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd\\\"],\\\"sizeBytes\\\":484074784},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\\\"],\\\"sizeBytes\\\":470717179},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\\\"],\\\"sizeBytes\\\":470575802},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3\\\"],\\\"sizeBytes\\\":468159025},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa\\\"],\\\"sizeBytes\\\":467133839},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\\\"],\\\"sizeBytes\\\":464984427},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9\\\"],\\\"sizeBytes\\\":463600445},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656\\\"],\\\"sizeBytes\\\":458025547},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf\\\"],\\\"sizeBytes\\\":456470711},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6\\\"],\\\"sizeBytes\\\":456273550},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6\\\"],\\\"sizeBytes\\\":455311777},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de\\\"],\\\"sizeBytes\\\":448723134},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\\\"],\\\"sizeBytes\\\":447940744}],\\\"runtimeHandlers\\\":[{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"crun\\\"},{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"\\\"},{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"runc\\\"}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"aggregated/unused_machine_configs_count.json0000640000000000000000000000004115147050257020135 0ustar0000000000000000{"unused_machineconfigs_count":0}config/machineconfigs/99-worker-ssh.json0000640000000000000000000000077115147050257016733 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:38Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"worker"},"name":"99-worker-ssh","resourceVersion":"2150","uid":"cdff789a-36d7-4b74-a268-0e47a6522755"},"spec":{"baseOSExtensionsContainerImage":"","config":{"ignition":{"version":"3.2.0"},"passwd":{"users":null},"storage":{"files":null}},"fips":false,"kernelArguments":null,"kernelType":"","osImageURL":""}}config/machineconfigs/99-master-ssh.json0000640000000000000000000000077115147050257016715 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:38Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"99-master-ssh","resourceVersion":"2120","uid":"9a8c5db9-478e-438e-88d1-68334be1fd0c"},"spec":{"baseOSExtensionsContainerImage":"","config":{"ignition":{"version":"3.2.0"},"passwd":{"users":null},"storage":{"files":null}},"fips":false,"kernelArguments":null,"kernelType":"","osImageURL":""}}config/machineconfigs/91-master-multipath-conf.json0000640000000000000000000000073715147050257021044 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:36Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"91-master-multipath-conf","resourceVersion":"2041","uid":"2ac5a84f-d1f0-4f74-8b84-0d2dbf3ef5bd"},"spec":{"config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"enabled":true,"name":"multipathd.service"}]}}}}config/machineconfigs/91-master-lv-cinder-volumes.json0000640000000000000000000000201015147050257021447 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:37Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"91-master-lv-cinder-volumes","resourceVersion":"2058","uid":"65830ef7-9230-4600-b783-ee57b9b01983"},"spec":{"config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"}]}}}}config/machineconfigs/90-master-netifnames-conf.json0000640000000000000000000000070115147050257021154 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:35Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"90-master-netifnames-conf","resourceVersion":"1997","uid":"480db452-0149-4c2d-b582-b7a49e8f41a2"},"spec":{"config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null}},"kernelArguments":["net.ifnames=0"]}}config/machineconfigs/90-master-nable-iscsi.json0000640000000000000000000000073015147050257020273 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:36Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"90-master-nable-iscsi","resourceVersion":"2023","uid":"97167a89-c77f-435b-91dd-2420a92c40ad"},"spec":{"config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"enabled":true,"name":"iscsid.service"}]}}}}config/machineconfigs/50-workers-chrony-configuration.json0000640000000000000000000000064315147050257022451 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:35Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"worker"},"name":"50-workers-chrony-configuration","resourceVersion":"1977","uid":"1a577618-3e75-464d-8a37-1003866c5579"},"spec":{"config":{"ignition":{"version":"3.1.0"},"passwd":{"users":null},"storage":{"files":null}}}}config/machineconfigs/50-masters-chrony-configuration.json0000640000000000000000000000064315147050257022433 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:35Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"50-masters-chrony-configuration","resourceVersion":"1964","uid":"a1fb05ac-e30e-4fdb-8b73-b113cb78f4d3"},"spec":{"config":{"ignition":{"version":"3.1.0"},"passwd":{"users":null},"storage":{"files":null}}}}config/machineconfigs/50-master-dnsmasq-configuration.json0000640000000000000000000000147715147050257022422 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"creationTimestamp":"2026-02-23T12:55:34Z","generation":1,"labels":{"machineconfiguration.openshift.io/role":"master"},"name":"50-master-dnsmasq-configuration","resourceVersion":"1935","uid":"c68d90f7-fbb2-46d6-93dc-19d7ad1490a3"},"spec":{"config":{"ignition":{"version":"3.1.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"}]}}}}config/node/master-0.json0000640000000000000000000000551515147050257013771 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"a649b105-b588-45b2-81ba-99a4648aee7c","resourceVersion":"10016","creationTimestamp":"2026-02-23T12:59:06Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330224Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179248Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-23T13:05:51Z","lastTransitionTime":"2026-02-23T12:59:06Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-23T13:05:51Z","lastTransitionTime":"2026-02-23T12:59:06Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-23T13:05:51Z","lastTransitionTime":"2026-02-23T12:59:06Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-23T13:05:51Z","lastTransitionTime":"2026-02-23T13:00:59Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.109.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602022246-0","containerRuntimeVersion":"cri-o://1.31.13-6.rhaos4.18.git7ed6156.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/running_containers.json0000640000000000000000000000720615147050253015314 0ustar0000000000000000{"images":{"0":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","1":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","10":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","11":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","12":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","13":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","14":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","15":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","16":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","17":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","18":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","19":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","2":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","20":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","21":"sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed","22":"sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","23":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","24":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","25":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","26":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","27":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","28":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","29":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","3":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","30":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","31":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","32":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","33":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","34":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","35":"sha256:a1b426a276216372c7d688fe60e9eaf251efd35071f94e1bcd4337f51a90fd75","36":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","37":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","38":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","39":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","4":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","40":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","41":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","42":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","5":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","6":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","7":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","8":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","9":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83"},"containers":{"2026-02":{"0":10,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":1,"16":1,"17":1,"18":1,"19":1,"2":4,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":3,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":3,"40":1,"41":1,"42":1,"5":2,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-j5hpl.json0000640000000000000000000002473315147050253032335 0ustar0000000000000000{"metadata":{"name":"operator-controller-controller-manager-9cc7d7bb-j5hpl","generateName":"operator-controller-controller-manager-9cc7d7bb-","namespace":"openshift-operator-controller","uid":"c0d6008c-6e09-4e61-83a5-60456ca90e1e","resourceVersion":"9658","creationTimestamp":"2026-02-23T13:01:34Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"9cc7d7bb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.33/23\"],\"mac_address\":\"0a:58:0a:80:00:21\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.33/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.33\"\n ],\n \"mac\": \"0a:58:0a:80:00:21\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-9cc7d7bb","uid":"4902d3a9-6f67-45b7-8ffc-be1f72980e43","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-9l49w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-9l49w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-9l49w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.33","podIPs":[{"ip":"10.128.0.33"}],"startTime":"2026-02-23T13:01:34Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-23T13:01:36Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://f787a879efc5d4242ecd95b4dc2b9421807d998730d3c7d0198ac608a22e096d","started":true,"volumeMounts":[{"name":"kube-api-access-9l49w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"rollerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"cd1360bc-6499-496e-968c-b0e081f56a7a\"\nI0223 13:02:15.869064 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"cd1360bc-6499-496e-968c-b0e081f56a7a\"\nI0223 13:02:27.525825 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"eee06d73-e9d3-4204-86bd-004d7d9eb869\"\nI0223 13:02:29.345333 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"eee06d73-e9d3-4204-86bd-004d7d9eb869\"\nE0223 13:03:28.275767 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0223 13:04:28.279595 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0223 13:04:41.267519 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0223 13:04:41.267644 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-23T13:01:36Z","finishedAt":"2026-02-23T13:04:41Z","containerID":"cri-o://49260b269ae6d09884492d00790a3a52d5e0644389747da3e51aa260e0b91b26"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","containerID":"cri-o://9a0997d75615489d4d91525d520b1f48b044636546aee09415313e7b839573b0","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-9l49w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-4wvxd.json0000640000000000000000000002466415147050253025755 0ustar0000000000000000{"metadata":{"name":"network-node-identity-4wvxd","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"3d82f223-e28b-4917-8513-3ca5c6e9bff7","resourceVersion":"9641","creationTimestamp":"2026-02-23T13:00:15Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5978f5f76","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"1d70c698-dfcc-4ce8-bb80-e9f1cc9cb367","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-crt2t","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-crt2t","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-crt2t","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:15Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:15Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T13:00:15Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"8.838717 1 recorder.go:104] \"CSR \\\"csr-6vqmr\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-6vqmr\"} reason=\"CSRApproved\"\nI0223 13:00:48.847779 1 approver.go:230] Finished syncing CSR csr-6vqmr for master-0 node in 9.470474ms\nI0223 13:00:48.848006 1 approver.go:230] Finished syncing CSR csr-6vqmr for unknown node in 120.094µs\nI0223 13:00:48.859143 1 approver.go:230] Finished syncing CSR csr-6vqmr for unknown node in 80.422µs\nE0223 13:03:03.481890 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0223 13:03:18.481506 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0223 13:03:18.481706 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0223 13:03:33.482753 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0223 13:03:33.483044 1 ovnkubeidentity.go:309] error running approver: leader election lost\nI0223 13:03:33.483213 1 recorder.go:104] \"master-0_afffa5fb-97e9-4fd7-bc35-8d2c18644a96 stopped leading\" logger=\"events\" type=\"Normal\" object={\"kind\":\"Lease\",\"namespace\":\"openshift-network-node-identity\",\"name\":\"ovnkube-identity\",\"uid\":\"b5225280-90b5-4ca2-9936-7301bd791299\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"9333\"} reason=\"LeaderElection\"\n","startedAt":"2026-02-23T13:00:28Z","finishedAt":"2026-02-23T13:03:33Z","containerID":"cri-o://c1dd3ed6ae85552fa55579d176bf04ab4acb74f8741f6985ce9c654154b5172e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","containerID":"cri-o://b3ddf54bf6f19c8296e0175ded46bf9b3d3f12dbbe1d4cee2713a7180fbe826e","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-crt2t","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-23T13:00:27Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","containerID":"cri-o://9cd234ed6b8c15b6ef57d4b02e5f80e2f747f3235364a87dcbaf6ecc39b293c8","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-crt2t","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615147050253026261 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"f0137d9c-1818-4d37-bf4e-c09315e858b9","resourceVersion":"3837","creationTimestamp":"2026-02-23T13:00:43Z","annotations":{"kubernetes.io/config.hash":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.mirror":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.seen":"2026-02-23T12:58:32.863469548Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"a649b105-b588-45b2-81ba-99a4648aee7c","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T13:01:06Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T12:58:40Z","finishedAt":"2026-02-23T12:58:40Z","containerID":"cri-o://9b2e0681668d9a8b51eaa2c8d5041d6128575d63543d355f03fa756ab6c575b2"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://9b2e0681668d9a8b51eaa2c8d5041d6128575d63543d355f03fa756ab6c575b2","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-23T12:59:26Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0223 12:58:56.386194 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0223 12:58:56.386432 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0223 12:58:56.388457 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-23T12:58:56Z","finishedAt":"2026-02-23T12:58:56Z","containerID":"cri-o://6309b849305c2ac7e7421c226eeec915d4326c5ea8505a4a455386262b3b15bd"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://0bb705c5c9f04251f2f3ae5ef9f44d40f3c6c1b144c3946a4cd25703a7f7278f","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-6569778c84-gswst.json0000640000000000000000000002432015147050253025331 0ustar0000000000000000{"metadata":{"name":"ingress-operator-6569778c84-gswst","generateName":"ingress-operator-6569778c84-","namespace":"openshift-ingress-operator","uid":"dcd03d6e-4c8c-400a-8001-343aaeeca93b","resourceVersion":"9656","creationTimestamp":"2026-02-23T12:59:09Z","labels":{"name":"ingress-operator","pod-template-hash":"6569778c84"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-6569778c84","uid":"06a4af6a-ff5f-4615-aa71-073fe75d40fd","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-r8l8f","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-r8l8f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-r8l8f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:52Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"n event from the watch stream: context canceled\") has prevented the request from succeeding\nW0223 13:04:23.197066 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-23T13:04:23.197Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\nW0223 13:04:23.197196 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0223 13:04:23.197310 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Deployment ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0223 13:04:23.197378 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-23T13:04:23.200Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"[failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route, failed waiting for all runnables to end within grace period of 30s: context deadline exceeded]\", \"errorCauses\": [{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}, {\"error\": \"failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\"}]}\n2026-02-23T13:04:23.200Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n","startedAt":"2026-02-23T13:01:52Z","finishedAt":"2026-02-23T13:04:23Z","containerID":"cri-o://d573c3e0e8ebb6202d8c5ebe9e0d85b859c5927b89cbdd3a205e10371f242b28"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","containerID":"cri-o://cfa0d87799396810f28fecb1db2d2995af8c1e625bda9bdf2ef89a91efe10c77","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-r8l8f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-23T13:01:52Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://158e1afd791e26b7a7587aaef9543b7419a4a9e119c24e9867350ebe56178a58","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-r8l8f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-584cc7bcb5-t9gx8.json0000640000000000000000000002041515147050253033601 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-584cc7bcb5-t9gx8","generateName":"openshift-controller-manager-operator-584cc7bcb5-","namespace":"openshift-controller-manager-operator","uid":"99399ebb-c95f-4663-b3b6-f5dfabf47fcf","resourceVersion":"9201","creationTimestamp":"2026-02-23T12:59:08Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"584cc7bcb5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-584cc7bcb5","uid":"a79f2355-aaf4-4731-96c7-6cae26a5104c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-p4h6l","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-p4h6l","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:24Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:24Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-02-23T13:00:59Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-02-23T13:02:23Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"oks completed\" name=\"PreShutdownHooksStopped\"\nI0223 13:02:22.912218 1 base_controller.go:181] Shutting down UserCAObservationController ...\nI0223 13:02:22.912268 1 operator.go:151] Shutting down OpenShiftControllerManagerOperator\nI0223 13:02:22.912324 1 base_controller.go:123] Shutting down worker of UserCAObservationController controller ...\nI0223 13:02:22.912335 1 base_controller.go:113] All UserCAObservationController workers have been terminated\nI0223 13:02:22.912361 1 base_controller.go:181] Shutting down LoggingSyncer ...\nI0223 13:02:22.912407 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ...\nI0223 13:02:22.912440 1 base_controller.go:113] All LoggingSyncer workers have been terminated\nI0223 13:02:22.912448 1 base_controller.go:181] Shutting down openshift-controller-manager ...\nI0223 13:02:22.912469 1 base_controller.go:123] Shutting down worker of openshift-controller-manager controller ...\nI0223 13:02:22.912480 1 base_controller.go:113] All openshift-controller-manager workers have been terminated\nI0223 13:02:22.912519 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector\nW0223 13:02:22.912541 1 builder.go:136] graceful termination failed, controllers failed with error: stopped\nI0223 13:02:22.912555 1 base_controller.go:181] Shutting down ConfigObserver ...\nI0223 13:02:22.912567 1 base_controller.go:181] Shutting down OpenshiftControllerManagerStaticResources-StaticResources ...\nI0223 13:02:22.912579 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ...\nI0223 13:02:22.912583 1 base_controller.go:113] All ConfigObserver workers have been terminated\nI0223 13:02:22.912588 1 base_controller.go:123] Shutting down worker of OpenshiftControllerManagerStaticResources-StaticResources controller ...\nI0223 13:02:22.912597 1 base_controller.go:113] All OpenshiftControllerManagerStaticResources-StaticResources workers have been terminated\n","startedAt":"2026-02-23T13:01:17Z","finishedAt":"2026-02-23T13:02:22Z","containerID":"cri-o://debed11d31f7b75fad2471852851fc7fa04c00d3d8576daf98e7b22222001920"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","containerID":"cri-o://276f3b55300c4b42b7df0ff3b3561d901d7c658a4848ac016dd56a91f3b44118","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-p4h6l","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-6f47d587d6-p5488.json0000640000000000000000000002174015147050253026472 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-6f47d587d6-p5488","generateName":"openshift-config-operator-6f47d587d6-","namespace":"openshift-config-operator","uid":"c2b80534-3c9d-4ddb-9215-d50d63294c7c","resourceVersion":"9664","creationTimestamp":"2026-02-23T12:59:09Z","labels":{"app":"openshift-config-operator","pod-template-hash":"6f47d587d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-6f47d587d6","uid":"fd00b531-8373-43fe-90f1-44c1162e4c9c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-l4j2q","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-l4j2q","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-l4j2q","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:00:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-02-23T13:00:59Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T13:01:08Z","finishedAt":"2026-02-23T13:01:08Z","containerID":"cri-o://a097939ffa402c84b79b8f7d24af36dfd241d3d508ee58d590cce7445e784fed"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","containerID":"cri-o://a097939ffa402c84b79b8f7d24af36dfd241d3d508ee58d590cce7445e784fed","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-l4j2q","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0223 13:03:12.607691 1 cmd.go:250] Using service-serving-cert provided certificates\nI0223 13:03:12.607938 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0223 13:03:12.608653 1 observer_polling.go:159] Starting file observer\nW0223 13:04:12.621738 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0223 13:04:12.622034 1 builder.go:298] config-operator version 4.18.0-202601302238.p2.g85cb407.assembly.stream.el9-85cb407-85cb40728227fac13a2983fb6e3170d67cf62075\nF0223 13:04:43.071879 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-config-operator/leases/config-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-23T13:03:12Z","finishedAt":"2026-02-23T13:04:43Z","containerID":"cri-o://c62b96fd922cdecfa004e96b0409b64671fda2f755f956fa786e2d7faadf3475"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","containerID":"cri-o://1d00be7013db5f4871f8f9fcca38d13b794aeb731da6878ede81daa395d911d9","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-l4j2q","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-6847bb4785-hgkrm.json0000640000000000000000000001403515147050253030304 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-6847bb4785-hgkrm","generateName":"csi-snapshot-controller-6847bb4785-","namespace":"openshift-cluster-storage-operator","uid":"4e6bc033-cd90-4704-b03a-8e9c6c0d3904","resourceVersion":"9671","creationTimestamp":"2026-02-23T13:01:18Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"6847bb4785"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-6847bb4785","uid":"8d7e2942-5708-4b9c-8e46-ca725c4cf377","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-2tgmq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-2tgmq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:22Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-02-23T13:01:18Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-23T13:05:40Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0223 13:04:44.786763 1 feature_gate.go:387] feature gates: {map[]}\nI0223 13:04:44.786943 1 main.go:169] Version: 661796e08c9cbbd782e43b2bd7211df9518c59dc\nI0223 13:04:44.788395 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0223 13:05:14.788909 1 main.go:104] Failed to list v1 volumesnapshotclasses with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshotclasses?limit=1\": context deadline exceeded\nE0223 13:05:14.788990 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-02-23T13:04:44Z","finishedAt":"2026-02-23T13:05:14Z","containerID":"cri-o://b344f0832b62956e749c09fccb690fc11d54040c9d919827bfbb6ce448268045"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","containerID":"cri-o://fdf69ec24e1c6086e49f484fb8b8dd94cca3653e3ce3d1c63357917cb9333952","started":true,"volumeMounts":[{"name":"kube-api-access-2tgmq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-machine-approver/machine-approver-798b897698-j6dvg.json0000640000000000000000000002145215147050253026570 0ustar0000000000000000{"metadata":{"name":"machine-approver-798b897698-j6dvg","generateName":"machine-approver-798b897698-","namespace":"openshift-cluster-machine-approver","uid":"21c55fd9-96b6-4dbb-9c26-a499a76cb259","resourceVersion":"9672","creationTimestamp":"2026-02-23T13:02:24Z","labels":{"app":"machine-approver","pod-template-hash":"798b897698"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-approver-798b897698","uid":"582d2a9a-0321-48f3-bd44-d23cd6855ec0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"machine-approver-tls","secret":{"secretName":"machine-approver-tls","defaultMode":420}},{"name":"config","configMap":{"name":"machine-approver-config","defaultMode":440,"optional":true}},{"name":"kube-api-access-wsnpf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9192,"containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-wsnpf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"machine-approver-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","command":["/usr/bin/machine-approver"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2","--logtostderr","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-cluster-machine-approver","--api-group-version=machine.openshift.io/v1beta1","--max-concurrent-reconciles=10"],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-wsnpf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-approver-sa","serviceAccount":"machine-approver-sa","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-approver-sa-dockercfg-8ph7r"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:24Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T13:02:24Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-23T13:02:27Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://5eaa42027dfe743f7060d78b14a41ed77e6a1ffe6e69302eaea8dbd8e960ded1","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-wsnpf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-approver-controller","state":{"running":{"startedAt":"2026-02-23T13:05:41Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0223 13:02:30.284445 1 controller.go:183] \"Starting Controller\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\"\nI0223 13:02:30.284471 1 recorder.go:104] \"master-0_2b71df23-3ebe-488f-adaa-5005dcd4bff3 became leader\" logger=\"events\" type=\"Normal\" object={\"kind\":\"Lease\",\"namespace\":\"openshift-cluster-machine-approver\",\"name\":\"cluster-machine-approver-leader\",\"uid\":\"2a0d6186-5dd8-4bc9-9324-fbd2b4a2356d\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"9442\"} reason=\"LeaderElection\"\nI0223 13:02:30.289747 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/cluster-machine-approver/status.go:99\nI0223 13:02:30.440819 1 reflector.go:368] Caches populated for *v1.ConfigMap from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106\nI0223 13:02:30.490958 1 controller.go:217] \"Starting workers\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" worker count=10\nE0223 13:03:30.296155 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0223 13:04:30.298592 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-machine-approver/cluster-machine-approver-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-machine-approver-leader)\nI0223 13:04:43.291623 1 leaderelection.go:297] failed to renew lease openshift-cluster-machine-approver/cluster-machine-approver-leader: timed out waiting for the condition\nE0223 13:05:17.300512 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0223 13:05:17.300614 1 main.go:244] unable to run the manager: leader election lost\n","startedAt":"2026-02-23T13:02:30Z","finishedAt":"2026-02-23T13:05:17Z","containerID":"cri-o://f45582d713ba7f5a3231dd4806d3bed2ec2d09709585cfd4e8763db70defaa17"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","containerID":"cri-o://38c4e280e1f5ef2d8b8ea6dc914f9ff457c428dfa40d773747ea73eea575eb11","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-wsnpf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-bckd6.json0000640000000000000000000002541415147050253025635 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-84b8d9d697-bckd6","generateName":"catalogd-controller-manager-84b8d9d697-","namespace":"openshift-catalogd","uid":"bfbb4d6d-7047-48cb-be03-97a57fc688e3","resourceVersion":"9654","creationTimestamp":"2026-02-23T13:01:35Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"84b8d9d697"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.34/23\"],\"mac_address\":\"0a:58:0a:80:00:22\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.34/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.34\"\n ],\n \"mac\": \"0a:58:0a:80:00:22\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-84b8d9d697","uid":"6be50c1a-e203-4d4c-9adc-331541ad606f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-rqsvs","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-rqsvs","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-rqsvs","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:05:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:01:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.34","podIPs":[{"ip":"10.128.0.34"}],"startTime":"2026-02-23T13:01:35Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-23T13:01:40Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://03efc28194de33d2ec07ae6162b6263cb9291732ea47b0d97c7caffde4cb8bb2","started":true,"volumeMounts":[{"name":"kube-api-access-rqsvs","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-23T13:04:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"871f6f70-b6cc-426a-b54c-c32951d570a4\" layer=0\nI0223 13:04:09.488450 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"871f6f70-b6cc-426a-b54c-c32951d570a4\" layer=1\nI0223 13:04:09.654738 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"871f6f70-b6cc-426a-b54c-c32951d570a4\" layer=2\nI0223 13:04:12.071568 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"871f6f70-b6cc-426a-b54c-c32951d570a4\" layer=3\nI0223 13:04:13.156591 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"871f6f70-b6cc-426a-b54c-c32951d570a4\" layer=4\nI0223 13:04:19.458988 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0223 13:04:19.459183 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0223 13:04:19.459300 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\n","startedAt":"2026-02-23T13:01:40Z","finishedAt":"2026-02-23T13:04:19Z","containerID":"cri-o://b8216c6629595ae79e53d792a20a769b60a06e1e5c09e5dc292d86cb2730407e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","containerID":"cri-o://851d34e72cd075433d8cf4b69dc2fdf69944f4b7cdd7245de32f6eacad0a08da","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-rqsvs","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/clusteroperator/storage.json0000640000000000000000000000131215147050253016300 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"607ad887-55d1-4ef1-a608-ac5948e79f35","resourceVersion":"819","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315147050253016660 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"f6e6e1ff-9c85-452a-b1c2-3d96cf40b629","resourceVersion":"4899","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:19Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:23Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:21Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:21Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000310115147050253024652 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"30f419f5-2c23-41bf-a29a-2c5020731ff9","resourceVersion":"6862","generation":1,"creationTimestamp":"2026-02-23T12:55:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:55Z","message":"Failed to deploy 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:54Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000144015147050253023446 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"0fa6f9ac-812f-4201-8685-df8bf95cb8ec","resourceVersion":"841","generation":1,"creationTimestamp":"2026-02-23T12:55:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115147050253022042 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"9621dd6f-00ef-4db3-8f29-4bba3215c85b","resourceVersion":"6570","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315147050253020304 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"09b341c2-2e6d-44ed-80c1-836823fa657a","resourceVersion":"790","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215147050253022440 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"17d5d913-021c-46a9-b42b-444de6e8528c","resourceVersion":"9007","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:01:23Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4."},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:02:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:23Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215147050253020636 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"177b7ae9-8706-455e-955a-9be3734116b1","resourceVersion":"7621","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:19Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:02:04Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:21Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:19Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:19Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"openshift-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415147050253015427 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"4490c333-87bd-4b3e-a33d-3e6f19275da8","resourceVersion":"6881","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:22Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:55Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:55Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:22Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:22Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115147050253017066 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"5b26106e-3f6c-4104-8c31-e31940c42e16","resourceVersion":"6950","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:58Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.33\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:58Z","reason":"AsExpected","message":"Cluster version is \"4.18.33\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315147050253016337 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"4e91b957-4e7c-480f-b0c8-52455ab44a5a","resourceVersion":"7099","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-23T12:59:57Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T12:59:45Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T12:59:45Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:02:01Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:08Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715147050253017032 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"13020ecf-d303-4803-8d63-8c39e691b88a","resourceVersion":"6519","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:52Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:52Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315147050253017127 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"794146a5-8344-4dc9-a20a-a5e1a349d6d8","resourceVersion":"6689","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.33"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015147050253017501 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"f515676f-2a1f-4a0b-831e-0b23d3643d18","resourceVersion":"801","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215147050253020101 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"e7b5becc-26af-4e4d-82a3-c1113dfe8e3d","resourceVersion":"9452","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:02:30Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.33"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:02:30Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:02:30Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:02:30Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415147050253017017 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"fcc8a699-1154-4440-9f7a-94ae658355d5","resourceVersion":"807","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315147050253022537 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"c0065974-5825-4295-80c3-a429cab32bc1","resourceVersion":"9599","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:24Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:24Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615147050253017547 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"5f04a601-22e1-428d-9af9-62554f72ee18","resourceVersion":"8660","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:01:34Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715147050253021370 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"7ff3be5e-454b-4726-baea-d5eb324dfb1f","resourceVersion":"9668","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:19Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715147050253017575 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"c7776dc8-017e-43e4-a554-8a22399f2ea9","resourceVersion":"7060","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:03Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:02:01Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:04Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:03Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415147050253016467 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"9becfa21-e412-4ca2-b67b-11e9149c83f2","resourceVersion":"821","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715147050253016325 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"30e1e9a8-455d-489c-9206-7060c1b35435","resourceVersion":"7231","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:02:01Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:02:01Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715147050253017572 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"795af56d-d76e-42b4-98c9-82a4af91c6b2","resourceVersion":"814","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015147050253015564 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"226010cf-4cd4-4cb8-98d2-64246f3f5fa0","resourceVersion":"6710","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515147050253015434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"87980225-7fa5-46ce-89bc-7c13ffd78e6d","resourceVersion":"9239","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:02:24Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:53Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:02:24Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000337415147050253021442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"e045cf27-8a8f-4482-8a7d-42299a44a582","resourceVersion":"9615","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"WebhookRemovalControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:22Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:22Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"csi-snapshot-controller","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515147050253021615 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"aa0c245a-000d-4a52-a00a-35a41c0f2cf3","resourceVersion":"9241","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:02:25Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:02:25Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:02:25Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:02:25Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215147050253016276 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"85ecf10b-042b-41cc-bb66-788e0dd29d86","resourceVersion":"820","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615147050253017736 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"3f5b40fe-90e2-45aa-8230-701dae122f22","resourceVersion":"4280","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000260315147050253020461 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"4791c136-f4b2-4508-9612-3d5298071ffe","resourceVersion":"9594","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:05:36Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:05:36Z"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-23T13:05:36Z","reason":"MissingDependency","message":"machine-api not ready"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:05:36Z"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001520715147050253020062 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"f5fdafef-1769-4957-bef2-03f2bc91d739","resourceVersion":"1949","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T12:55:27Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T12:55:27Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T12:55:27Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T12:55:27Z"}],"versions":[{"name":"operator","version":""}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715147050253021546 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"a48e547d-42d9-4d4e-87b9-eee398aceb33","resourceVersion":"812","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000312315147050253016572 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"350b786a-4cf9-4cf1-9420-1eb23d3dd83a","resourceVersion":"816","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773215147050253017667 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"9dfd4105-737d-4b6a-aaf0-c744e165a9ab","resourceVersion":"8322","generation":1,"creationTimestamp":"2026-02-23T12:55:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.139.67:443/healthz\": dial tcp 172.30.139.67:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T13:02:11Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T13:01:19Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.139.67:443/healthz\": dial tcp 172.30.139.67:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215147050253020176 0ustar0000000000000000[]config/pod/openshift-cluster-version/cluster-version-operator-57476485-j4p78.json0000640000000000000000000001341015147050253026126 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-57476485-j4p78","generateName":"cluster-version-operator-57476485-","namespace":"openshift-cluster-version","uid":"fc576a63-0ea6-40c8-90bc-c44b5dc95ecd","resourceVersion":"7761","creationTimestamp":"2026-02-23T13:02:08Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"57476485"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-57476485","uid":"8404b055-700a-43a5-91ce-1a96a712cd5a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:09Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:09Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T13:02:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T13:02:08Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-23T13:02:08Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","containerID":"cri-o://5db2f0540bf3595f6491e89d67843156a4d64e6dce1fba55ec53b1c3ad371af1","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415147050253011024 0ustar0000000000000000f8d6134b-3237-45d8-a7c9-829e4d89a693config/version.json0000640000000000000000000000757715147050253013107 0ustar0000000000000000{"metadata":{"name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","resourceVersion":"9563","generation":2,"creationTimestamp":"2026-02-23T12:54:44Z"},"spec":{"clusterID":"f8d6134b-3237-45d8-a7c9-829e4d89a693","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","url":"https://access.redhat.com/errata/RHSA-2026:2078","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-23T12:55:08Z","completionTime":null,"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","verified":false}],"observedGeneration":2,"versionHash":"aMIRe2pH-Eo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-23T12:55:08Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-23T12:55:08Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-23T12:55:08Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-23T12:55:08Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T12:55:08Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-23T13:04:58Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cluster-autoscaler, control-plane-machine-set, dns, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-approver, monitoring, openshift-apiserver, openshift-samples, storage are not available\n* Could not update clusterrole \"cloud-node-manager\" (160 of 906)\n* Could not update clusterrolebinding \"machine-api-controllers\" (217 of 906)\n* Could not update configmap \"openshift-machine-config-operator/kube-rbac-proxy\" (777 of 906)\n* Could not update configmap \"openshift-operator-lifecycle-manager/olm-operators\" (681 of 906)\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T12:55:08Z","reason":"MultipleErrors","message":"Unable to apply 4.18.33: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515147050252023216 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115147050252025426 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715147050252025135 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715147050252025126 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315147050252022246 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515147050252026702 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115147050252023405 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115147050252023201 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115147050252025471 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715147050252017534 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-23T13:01:52Z","not_after":"2028-02-23T13:01:53Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-23T13:01:54Z","not_after":"2028-02-23T13:01:55Z","controllers":[]}]config/authentication.json0000640000000000000000000000116515147050252014423 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6f90a703-3110-4b8d-b1ec-00a7105082b2","resourceVersion":"1183","generation":1,"creationTimestamp":"2026-02-23T12:55:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/image.json0000640000000000000000000000111715147050252012463 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ea08b010-d3b5-4cd6-847b-b99bfb008c44","resourceVersion":"1616","generation":1,"creationTimestamp":"2026-02-23T12:55:26Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315147050252023443 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"9bc53cf7-1c44-4157-8a30-70c0626833d5","resourceVersion":"4197","generation":1,"creationTimestamp":"2026-02-23T13:01:18Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015147050252022046 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"be135ba4-a69c-433a-932f-698c964a3a26","resourceVersion":"4155","generation":1,"creationTimestamp":"2026-02-23T13:01:18Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-23T13:01:18Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/proxy.json0000640000000000000000000000031315147050252012557 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"961c55f6-1ec0-44c2-9a01-529e430ddfa2","resourceVersion":"564","generation":1,"creationTimestamp":"2026-02-23T12:54:40Z"},"spec":{"trustedCA":{"name":""}},"status":{}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002147015147050252025477 0ustar0000000000000000{"metadata":{"name":"edit","uid":"fd0398fa-153d-408b-b59f-052ee0684143","resourceVersion":"9536","creationTimestamp":"2026-02-23T12:53:45Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002435515147050252025647 0ustar0000000000000000{"metadata":{"name":"admin","uid":"9fc1fd02-ffd5-41f6-a656-e9ee3d631f0e","resourceVersion":"9535","creationTimestamp":"2026-02-23T12:53:45Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/apiserver.json0000640000000000000000000000121615147050252013401 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"316a6eb5-512f-4cd0-8605-e97b84a96a58","resourceVersion":"947","generation":1,"creationTimestamp":"2026-02-23T12:55:11Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415147050252015224 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"7b811ffc-844d-452a-a8fa-02dc36bed116","resourceVersion":"569","generation":1,"creationTimestamp":"2026-02-23T12:54:41Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/infrastructure.json0000640000000000000000000000106515147050252014463 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"40ea783f-f3d1-4206-8190-ae280a101303","resourceVersion":"546","generation":1,"creationTimestamp":"2026-02-23T12:54:38Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174015147050252025115 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"1e734dfb-1eba-4343-94fc-2ae4ddf8773d","resourceVersion":"1618","generation":1,"creationTimestamp":"2026-02-23T12:55:26Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":0,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-23T12:55:26Z","reason":"InsufficientPods","message":""}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115147050252027747 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"50eab9ed-db99-44d5-9697-981c2e553169","resourceVersion":"6658","generation":1,"creationTimestamp":"2026-02-23T13:01:52Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T13:01:52Z","reason":"AsExpected"}]}}config/oauth.json0000640000000000000000000000114415147050252012521 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8e27be16-1461-45df-9c2e-c693f27079e7","resourceVersion":"1700","generation":1,"creationTimestamp":"2026-02-23T12:55:27Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e8d668a9-32e4-4040-bf6d-ac934c038489"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/ingress.json0000640000000000000000000000043615147050252013056 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1e3f31bb-23f6-4eea-8471-1ea8aec2dd1f","resourceVersion":"561","generation":1,"creationTimestamp":"2026-02-23T12:54:39Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615147050252027477 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"9dde8834-6ae8-4039-b57d-ee015ba27afc","resourceVersion":"5291","generation":2,"creationTimestamp":"2026-02-23T13:01:27Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/network.json0000640000000000000000000000117015147050252013071 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3b6f143e-26e8-4039-908e-0dc895f5c6ad","resourceVersion":"3245","generation":2,"creationTimestamp":"2026-02-23T12:54:40Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}